[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Security Implications of Typical Grid Computing Usage Scenarios

Published: 01 July 2002 Publication History

Abstract

Grid Computing consists of a collection of heterogeneous computers and resources spread across multiple administrative domains with the intent of providing users uniform access to these resources. There are many ways to access the resources of a Grid, each with unique security requirements and implications for both the resource user and the resource provider. A comprehensive set of Grid usage scenarios is presented and analyzed with regard to security requirements such as authentication, authorization, integrity, and confidentiality. The main value of these scenarios and the associated security discussions is to provide a library of situations against which an application designer can match, thereby facilitating security-aware application use and development from the initial stages of the application design and invocation. A broader goal of these scenarios is to increase the awareness of security issues in Grid Computing.

References

[1]
{1} S. Chapin, D. Katramatos, J. Karpovich and A. Grimshaw, Resource management in Legion, Future Generation Computer Systems 15(5-6) (1999) 583-594.
[2]
{2} K. Czajkowski, S. Fitzgerald, I. Foster and C. Kesselman, Grid information services for distributed resource, in: Proc. of the 10th IEEE International Symposium on High-Performance Distributed Computing (HPDC-10) (IEEE Press, August 2001).
[3]
{3} Department of Energy Science Grid, http://www.itg.lbl.gov/Grid
[4]
{4} T. Dierks and C. Allen, The TLS Protocol - Version 1.0. IETF RFC 2246 (January 1999) work-in-progress.
[5]
{5} European EGrid, http://www.egrid.org
[6]
{6} S. Farrell, J. Vollbrecht, P. Calhoun, L. Gommans, G. Gross, B. de Bruijn, C. de Laat, M. Holdrege and D. Spence, AAA Authorization Requirements, RFC 2906, Informational, August 2000, work-in-progress.
[7]
{7} A. Ferrari, F. Knabe, M. Humphrey, S. Chapin and A. Grimshaw, A flexible security system for metacomputing environments, in: Proc. High Performance Computing and Networking Europe 1999, Amsterdam, April 1999.
[8]
{8} I. Foster and C. Kesselman, Globus: A metacomputing infrastructure toolkit, International Journal of Supercomputer Applications 11(2) (1997) 115-128.
[9]
{9} I. Foster, C. Kesselman, G. Tsudik and S. Tuecke, A security architecture for computational Grids, in: Proc. 5th ACM Conference on Computer and Communications Security Conference (1998) pp. 83-92.
[10]
{10} Global Grid Forum, http://www.gridforum.org/
[11]
{11} A. Grimshaw, W. A. Wulf et al., The Legion vision of a worldwide virtual machine, Communications of the ACM 40(1) (1997) 39-45.
[12]
{12} High Energy Physics Data Grid, http://les.home.cern.ch/~les/grid/ welcome.html
[13]
{13} M. Humphrey and M. Thompson, Security implications of typical grid computing usage scenarios, Informational Draft (October 2000), http://www.gridforum.org/security/drafts/draft-gridforum-security-implications-01.pdf.
[14]
{14} M. Humphrey and M. Thompson, Security implications of typical grid computing usage scenarios, in: Proc. of the 10th International Symposium on High Performance Distributed Computing (HPDC), San Francisco, CA (7-9 August 2001).
[15]
{15} W. E. Johnston, K. Jackson and S. Talwar, Security Considerations for Computational and Data Grids, in: Proc. of the 10th IEEE Symposium on High Performance Distributed Computing, August 2001.
[16]
{16} NASA's Information Power Grid, http://www.ipg.nasa.gov/
[17]
{17} B. C. Neuman and T. Ts'o. Kerberos: An authentication service for computer networks, IEEE Communications Magazine 32(9) (1994) 33-38.
[18]
{18} C. M. Pancerell, L. A. Rahn and C. L. Yang, The Diesel combustion collaboratory: Combustion researchers collaborating over the Internet, in: Proc. of SC 99, Portland, OR (13-19 November 1999).
[19]
{19} G. Stoker, B. White, E. Stackpole, T.J. Highley and M. Humphrey, Toward realizable restricted delegation in Computational Grids, in: Proc. of the International Conference on High Performance Computing and Networking Europe (HPCN Europe 2001), Amsterdam, Netherlands (June 2001).
[20]
{20} J. Vollbrecht, P. Calhoun, S. Farrell, L. Gommans, G. Gross, B. de Bruijn, C. de Laat, M. Holdrege and D. Spence, AAA Authorization Application Examples, RFC 2905, Informational (August 2000) work-in-progress.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Cluster Computing
Cluster Computing  Volume 5, Issue 3
July 2002
110 pages

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 01 July 2002

Author Tags

  1. Global Grid Forum
  2. Globus
  3. Grid Computing
  4. Legion
  5. computer security
  6. usage scenarios

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2010)GUTSProceedings of the 6th international conference on Security and trust management10.5555/2050149.2050155(84-99)Online publication date: 23-Sep-2010
  • (2008)Expressions of expertnessProceedings of the 4th symposium on Usable privacy and security10.1145/1408664.1408675(77-88)Online publication date: 23-Jul-2008
  • (2008)QoS Requirements for a Medical Application on the GridComputer Supported Cooperative Work in Design IV10.1007/978-3-540-92719-8_29(316-330)Online publication date: 18-Dec-2008
  • (2007)Transparent access to grid-based compute utilitiesProceedings of the 7th international conference on Parallel processing and applied mathematics10.5555/1786194.1786289(817-824)Online publication date: 9-Sep-2007
  • (2006)Implications of virtualization on grids for high energy physics applicationsJournal of Parallel and Distributed Computing10.1016/j.jpdc.2005.12.01366:7(922-930)Online publication date: 1-Jul-2006

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media