Grid Security: Problems and Potential Solutions

نویسنده

  • Howard Chivers
چکیده

This paper was provided as technical input to the gap analysis of the UK escience programme, March 2003. The paper outlines generic requirements for security in grid systems and the problems that are often cited with current grid software. It is argued that these issues can be resolved by the federation of both users and resources. This concept of federation extends beyond user identity systems to include organisational responsibilities and policy bindings. The paper also outlines application specific security issues and makes recommendations on how they could be addressed in the programme. 1. Requirements and Issues Grid security requirements can be divided into project specific and generic. Generic requirements include some that apply to existing systems, but are stretched by scalability and administration complexity, and some that are new to highly distributed systems, such as remote delegation and distributed authorisation. This discussion is mostly about generic requirements. This is a wide topic; the grid security architecture[1] provides the rationale for the original grid requirements, a recent review of security issues in large distributed systems[2] indicates that there are many issues still to be considered. The purpose of this section is to set the context for current problems, and how they might be resolved, so the following is a brief summary of generic requirements, from the point of view of the main stakeholders: users and resource providers. Users are either individual end users, or individuals responsible for projects that may be ‘virtual’ (span several organisations). Typical requirements are: • speed – to introduce new users or groups into a system quickly. • flexibility about the privileges provided to a group or individual. • privacy – to constrain the flow and use of private data in a system, including data used for authentication. • security – to be able to set up a grid with agreed security features (e.g. only allow data to flow to certain processing sites). • delegated action – to allow the system to carry out a range of functions for the user when the user is not present.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security in grid computing

In this paper, first we survey security problems which exist in grid computing and then we analyze security requirements. At the end we introduce a framework which Erin Cody has posed as a solution for security problems of grid computing. The framework presented classifies security literature into System Solutions, Behavioral Solutions and Hybrid Solutions.

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

Security in grid computing: A review and synthesis

This paper provides an extensive survey of the different methods of addressing security issues in the grid computing environment, and specifically contributes to the research environment by developing a comprehensive framework for classification of these research endeavors. The framework presented classifies security literature into System Solutions, Behavioral Solutions, Hybrid Solutions and R...

متن کامل

Minimization of Security Alerts under Denial of Service Attacks in Grid Computing Networks

Grid computing networks aggregate huge computing power that they need for solving different scientific problems. This power can be used for attacking the grid’s components as well as outside computers. Attacks such as the Denial of Service (DoS) could be used to target user machines, servers, and security management solutions to sabotage the normal operations of the grid computing network. In t...

متن کامل

Security Infrastructure for Grid-Enabled Biomedical Services

The potential benefits and advantages that Grid Computing can bring to society in different fields of human endeavour are many and varied. These benefits however, can only be usefully realised if they can be implemented securely. Currently, there are many standards in the Grid community for enforcing security, particularly authorization, and no single specification has been adopted as the defin...

متن کامل

Towards Monitoring Security Aspects in Mobile Grid Computing Systems: a Survey

In recent years, the proliferation of mobile devices has led to the emergence of mobile grid computing, that is extending the reach of grid computing by enabling mobile devices both to contribute to and utilise grid resources. Thus, the pool of available computational and storage resources can be significantly enriched by leveraging idle capacities of mobile devices. Nevertheless, the emergence...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003