Security Implications of Typical Grid Computing Usage Scenarios

Grid Computing consists of a collection of heterogeneous computers and resources spread across multiple administrative domains with the intent of providing users uniform access to these resources. There are many ways to access the resources of a Grid, each with unique security requirements and implications for both the resource user and the resource provider. A comprehensive set of Grid usage scenarios is presented and analyzed with regard to security requirements such as authentication, authorization, integrity, and confidentiality. The main value of these scenarios and the associated security discussions is to provide a library of situations against which an application designer can match, thereby facilitating security-aware application use and development from the initial stages of the application design and invocation. A broader goal of these scenarios is to increase the awareness of security issues in Grid Computing.

[1]  John F. Karpovich,et al.  Resource management in Legion , 1999, Future Gener. Comput. Syst..

[2]  Andrew S. Grimshaw,et al.  Accountability and Control of Process Creation in Metasystems , 2000, NDSS.

[3]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[4]  Andrew S. Grimshaw,et al.  A Flexible Security System for Metacomputing Environments , 1999, HPCN Europe.

[5]  Ian T. Foster,et al.  A security architecture for computational grids , 1998, CCS '98.

[6]  Ian T. Foster,et al.  Grid information services for distributed resource sharing , 2001, Proceedings 10th IEEE International Symposium on High Performance Distributed Computing.

[7]  Leon Gommans,et al.  AAA Authorization Requirements , 2000, RFC.

[8]  Premkumar T. Devanbu,et al.  Resource Management , 2000, EDO.

[9]  Andrew S. Grimshaw,et al.  The Legion Vision of a Worldwide Computer. , 1997 .

[10]  William E. Johnston,et al.  Overview of security considerations for computational and data grids , 2001, Proceedings 10th IEEE International Symposium on High Performance Distributed Computing.

[11]  Marty Humphrey,et al.  Security Implications of Typical Grid Computing Usage Scenarios , 2001, Proceedings 10th IEEE International Symposium on High Performance Distributed Computing.

[12]  Marty Humphrey,et al.  Toward Realizable Restricted Delegation in Computational Grids , 2001, HPCN Europe.

[13]  Andrew S. Grimshaw,et al.  The Legion vision of a worldwide virtual computer , 1997, Commun. ACM.

[14]  Carmen M. Pancerella,et al.  The Diesel Combustion Collaboratory: Combustion Researchers Collaborating over the Internet , 1999, SC.

[15]  Ian T. Foster,et al.  Globus: a Metacomputing Infrastructure Toolkit , 1997, Int. J. High Perform. Comput. Appl..

[16]  Christopher Allen,et al.  The TLS Protocol Version 1.0 , 1999, RFC.

[17]  Leon Gommans,et al.  AAA Authorization Application Examples , 2000, RFC.