Secure Architectures for Clusters and Grids
نویسندگان
چکیده
For applications like multi-physics simulations or complex data analysis, todays needs in computations require to gather thousands of computers geographically scattered and interconnected throw the Internet. Also the use of large scale global computing platforms – from a grid that couples several clusters of computers to peer-to-peer systems – has been experimented for some compute intensive high-end applications, such as the popular Seti@home [3] or BlueGene [1]. However, extending such global computing platforms to a wide class of applications and resources faces several critical security issues concerning the software architecture that manages the grid: [9]: • users and machines have to be authenticated; • as regards communications, privacy, integrity and nonrepudiation are still basic requirements; • component failures and disconnections are frequent events: the system has to ensure fault-tolerance for the application; • the results computed on remote resources, that may be victims of Trojan horses, have to be certified. In this paper, we firstly compare and classify (§II) the various security policies that have been developed for clusters and grids, from point-to-point security to private key (Kerberos, Kryptoknight) and public key (PKI) infrastructures. Coupling several clusters requires compliance with the local security policies on each local cluster, either by deploying a virtual private network (VPN) or based on a PKI infrastructure (Globus [8], DataGrid [4]). In order to resist to attacks by Trojan horses, output results are checked on the replication of computations, either total replication [19] or, more recently, partial replication [13]. Yet, tackling both security issues in a global architecture remains an open problem. In section IV, we propose a security infrastructure that address both problems. Smart cards (§III) are used in order to address authentication issues while using the system from a non trusted machine.
منابع مشابه
An Architecture For Computational Grids Based On Proxy Servers
The Computational Grid concept allows for large-scale resource sharing. The implementation of Grid environments relies on the existence of a communications infrastructure and efficient resource management. Access control and secure communication are also required. Architectures to support Computational Grids can be developed in a variety of ways. This work presents an approach to create a Grid ...
متن کاملImproving Mobile Grid Performance Using Fuzzy Job Replica Count Determiner
Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common computational platform. Mobile Computing is a Generic word that introduces using of movable, handheld devices with wireless communication, for processing data. Mobile Computing focused on providing access to data, information, services and communications anywhere an...
متن کاملImproving Mobile Grid Performance Using Fuzzy Job Replica Count Determiner
Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common computational platform. Mobile Computing is a Generic word that introduces using of movable, handheld devices with wireless communication, for processing data. Mobile Computing focused on providing access to data, information, services and communications anywhere an...
متن کاملSecure Integration of Desktop Grids and Compute Clusters Based on Virtualization and Meta-Scheduling
Reducing the cost for business or scientific computations, is a commonly expressed goal in today’s companies. Using the available computers of local employees or the outsourcing of such computations are two obvious solutions to save money for additional hardware. Both possibilities exhibit security related disadvantages, since the deployed software and data can be copied or tampered if appropri...
متن کاملPerformance analysis of direct N-body algorithms for astrophysical simulations on distributed systems
We discuss the performance of direct summation codes used in the simulation of astrophysical stellar systems on highly distributed architectures. These codes compute the gravitational interaction among stars in an exact way and have an O(N2) scaling with the number of particles. They can be applied to a variety of astrophysical problems, like the evolution of star clusters, the dynamics of blac...
متن کاملA Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کامل