Design and implementation of a Grid proxy auditing infrastructure

Single sign-on and delegation of rights are key requirements for modern Grid infrastructures. These requirements are usually facilitated by X.509 und Private-Key Infrastructures (PKI) and proxy certificates. Proxy certificates, however, can be obtained and abused by a malicious third party. There is currently no method for end users to detect such abuse. We have designed a solution that enables a thorough auditing of Grid proxy usage in Globus-based Grids and implemented a service that accepts auditing information via a web service interface and saves them to a back-end database. We introduce modifications to the Grid Security Infrastructure that allow sending audit trails from within Globus components if the user desires to track credential usage. A web-based front-end shows all logged information. With our approach, expert users can now closely monitor how their credentials are used after job submission. This will help build trust in Grid infrastructures and delegated authentication and authorization.

[1]  Ian T. Foster,et al.  Globus: a Metacomputing Infrastructure Toolkit , 1997, Int. J. High Perform. Comput. Appl..

[2]  Ian T. Foster,et al.  A security architecture for computational grids , 1998, CCS '98.

[3]  Steven Tuecke,et al.  Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile , 2004, RFC.

[4]  P.V. Coveney,et al.  Audited credential delegation: A sensible approach to grid authentication , 2009, 2009 5th IEEE International Conference on E-Science Workshops.

[5]  Lee Gillam,et al.  Towards job-specific service level agreements in the cloud , 2009, 2009 5th IEEE International Conference on E-Science Workshops.

[6]  Jim Basney,et al.  The MyProxy online credential repository , 2005, Softw. Pract. Exp..

[7]  Steve Todd,et al.  Scientific lineage and object-based storage systems , 2009, 2009 5th IEEE International Conference on E-Science Workshops.

[8]  Wolfgang Gentzsch,et al.  D-Grid, an E-Science Framework for German Scientists , 2006, 2006 Fifth International Symposium on Parallel and Distributed Computing.

[9]  Donald F. Ferguson,et al.  The WS-Resource Framework , 2004 .

[10]  Christian Grimm,et al.  A Concept for Grid Credential Lifecycle Management and Heuristic Credential Abuse Detection , 2009, 2009 Eighth International Symposium on Parallel and Distributed Computing.