Threat Model for Grid Security Services

The grid computing paradigm involves both the availability of abundant computing resources, and the storage of increased amounts of valuable data. Such information systems heavily rely upon the provision of adequate security. It is imperative that techniques be developed to assure the trustworthiness of these environments. Formal verification provides the tools and techniques to assess whether systems are indeed trustworthy, and is an established approach for security assurance. When using formal verification for security assessment one of the most important concerns should be to be precise about the threat model. A comprehensive threat model is indispensable for the simulations of a grid security model. This article presents a survey of the various threat models and discusses how and when these threat models may be inappropriate for use in the grid computing environments. Then a fine-grained threat model for grid computing is presented.

[1]  Kurt Stockinger,et al.  OptorSim : A Grid Simulator for Replica Optimisation , 2004 .

[2]  Francine D. Berman,et al.  The Teragrid Project , 2002 .

[3]  Markus Lorch,et al.  Grid Community Characteristics and their Relation to Grid Security , 2003 .

[4]  Hector Garcia-Molina,et al.  Adaptive peer-to-peer topologies , 2004 .

[5]  D. DeFigueiredo,et al.  Analysis of Peer-to-Peer Network Security using Gnutella , 2002 .

[6]  Andrew Martin,et al.  A Critical Survey of Grid Security Requirements and Technologies , 2003 .

[7]  Jim Austin,et al.  Delivering a Grid enabled Distributed Aircraft Maintenance Environment ( DAME ) , 2003 .

[8]  Boleslaw K. Szymanski,et al.  Simulation of dynamic data replication strategies in Data Grids , 2003, Proceedings International Parallel and Distributed Processing Symposium.

[9]  Marianne Shaw,et al.  Denali: Lightweight Virtual Machines for Distributed and Networked Applications , 2001 .

[10]  Rajkumar Buyya,et al.  GridSim: a toolkit for the modeling and simulation of distributed resource management and scheduling for Grid computing , 2002, Concurr. Comput. Pract. Exp..

[11]  Amin Vahdat,et al.  SHARP: an architecture for secure resource peering , 2003, SOSP '03.

[12]  Henri Casanova,et al.  Scheduling distributed applications: the SimGrid simulation framework , 2003, CCGrid 2003. 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2003. Proceedings..

[13]  Kavitha Ranganathan,et al.  Identifying Dynamic Replication Strategies for a High-Performance Data Grid , 2001, GRID.