Authorization Strategies for Virtualized Environments in Grid Computing Systems

نویسندگان

  • Xinming Ou
  • Anna Squicciarini
  • Sebastien Goasguen
  • Elisa Bertino
چکیده

The development of adequate security solutions, and in particular of authentication and authorization techniques, for grid computing systems is a challenging task. Recent trends of service oriented architectures (SOA), where users access grids through a science gateway — a web service that serves as a portal between users of a virtual organizations (VO) and the various computation resources, further complicate the authorization problem. Currently, the security component developed as part of the Globus Toolkit, the de facto standard for grid infrastructures, is not fully equiped with the capabilities to meet those challenges. The main drawback of the current approach is that it relies on a low level identity-based authorization scheme. A low-level access control policy maps a user’s identity (distinguished name) to a local account. This approach does not scale and is hard to manage in a distributed environment. The goal of this paper is to make a first step towards new authorization solutions that better fit novel grid infrastructures characterized by virtual organizations and science gateways. We review and analyze several solutions proposed, in particular GridShib and the VO Privilege Project, as they represent the most innovative techniques currently under development to achieve attribute-based authorization. We then propose several solutions for grid authorization through science gateways, and discuss how those existing projects can be leveraged to implement the solutions we propose.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Framework for Virtualized Systems with Data

Benefits have been claimed by adopting virtualization techniques in many fields. It could significantly reduce the cost of managing systems, including critical systems used in cyber power grid. However, in such environments, multiple virtual instances run on the same physical machine concurrently, and reliance on logical isolation makes a system vulnerable to attacks. Virtual Machine Introspect...

متن کامل

Virtual Environments - Framework for Virtualized Resource Access in the Grid

To assure secure access to any computer resources one must provide an adequate level of authentication, authorization job isolation and possibility of auditing user actions. In the grid environment that comprises a large number of users and resources in different administrative domains, these features are challenging. Grid economy and accounting related to it are becoming more and more importan...

متن کامل

E2DR: Energy Efficient Data Replication in Data Grid

Abstract— Data grids are an important branch of gird computing which provide mechanisms for the management of large volumes of distributed data. Energy efficiency has recently emerged as a hot topic in large distributed systems. The development of computing systems is traditionally focused on performance improvements driven by the demand of client's applications in scientific and business domai...

متن کامل

Weighted-HR: An Improved Hierarchical Grid Resource Discovery

Grid computing environments include heterogeneous resources shared by a large number of computers to handle the data and process intensive applications. In these environments, the required resources must be accessible for Grid applications on demand, which makes the resource discovery as a critical service. In recent years, various techniques are proposed to index and discover the Grid resource...

متن کامل

Technical Note: Kinds of cluster building/ grid environment with different resources for distributed computing in biomedicine

The German Biomedical Grid Projects at the University Medical Centers in Magdeburg and Göttingen have developed environments for distributed computing in medicine, especially with heterogeneous computing resources in different infrastructures. At the beginning it was a stand-alone computer pool installation, it was translated into virtualized environment in a sub network and finally the install...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008