Secure Architectures for Clusters and Grids

نویسندگان

  • Sébastien Varrette
  • Jean-Louis Roch
  • Yves Denneulin
  • Franck Leprévost
چکیده

For applications like multi-physics simulations or complex data analysis, todays needs in computations require to gather thousands of computers geographically scattered and interconnected throw the Internet. Also the use of large scale global computing platforms – from a grid that couples several clusters of computers to peer-to-peer systems – has been experimented for some compute intensive high-end applications, such as the popular Seti@home [3] or BlueGene [1]. However, extending such global computing platforms to a wide class of applications and resources faces several critical security issues concerning the software architecture that manages the grid: [9]: • users and machines have to be authenticated; • as regards communications, privacy, integrity and nonrepudiation are still basic requirements; • component failures and disconnections are frequent events: the system has to ensure fault-tolerance for the application; • the results computed on remote resources, that may be victims of Trojan horses, have to be certified. In this paper, we firstly compare and classify (§II) the various security policies that have been developed for clusters and grids, from point-to-point security to private key (Kerberos, Kryptoknight) and public key (PKI) infrastructures. Coupling several clusters requires compliance with the local security policies on each local cluster, either by deploying a virtual private network (VPN) or based on a PKI infrastructure (Globus [8], DataGrid [4]). In order to resist to attacks by Trojan horses, output results are checked on the replication of computations, either total replication [19] or, more recently, partial replication [13]. Yet, tackling both security issues in a global architecture remains an open problem. In section IV, we propose a security infrastructure that address both problems. Smart cards (§III) are used in order to address authentication issues while using the system from a non trusted machine.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Architecture For Computational Grids Based On Proxy Servers

The Computational Grid concept allows for large-scale resource sharing. The implementation of Grid environments relies on the existence of a communications infrastructure and efficient resource management. Access control and secure communication are also required. Architectures to support Computational Grids can be developed in a variety of ways. This work presents an approach to create a Grid ...

متن کامل

Improving Mobile Grid Performance Using Fuzzy Job Replica Count Determiner

Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common computational platform. Mobile Computing is a Generic word that introduces using of movable, handheld devices with wireless communication, for processing data. Mobile Computing focused on providing access to data, information, services and communications anywhere an...

متن کامل

Improving Mobile Grid Performance Using Fuzzy Job Replica Count Determiner

Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common computational platform. Mobile Computing is a Generic word that introduces using of movable, handheld devices with wireless communication, for processing data. Mobile Computing focused on providing access to data, information, services and communications anywhere an...

متن کامل

Secure Integration of Desktop Grids and Compute Clusters Based on Virtualization and Meta-Scheduling

Reducing the cost for business or scientific computations, is a commonly expressed goal in today’s companies. Using the available computers of local employees or the outsourcing of such computations are two obvious solutions to save money for additional hardware. Both possibilities exhibit security related disadvantages, since the deployed software and data can be copied or tampered if appropri...

متن کامل

Performance analysis of direct N-body algorithms for astrophysical simulations on distributed systems

We discuss the performance of direct summation codes used in the simulation of astrophysical stellar systems on highly distributed architectures. These codes compute the gravitational interaction among stars in an exact way and have an O(N2) scaling with the number of particles. They can be applied to a variety of astrophysical problems, like the evolution of star clusters, the dynamics of blac...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004