Scoping security issues for interactive grids (original) (raw)
Related papers
Improving Security Measures on Grid Computing
The purpose of this project was to come out with a theoretical framework to standardize the solutions to the existing security challenges. The principal objectives were to contribute to the ongoing research to help improve the security measures on grid computing. Hypervisor security model, Host/Platform security model, Security Communication model and Security between Guests were developed and implemented. The major finding derived from this study suggests that Grid Computing Security can have challenges in the following areas: Authentication and Authorization of users, integration to other exiting systems and enforcing trust policies within dynamic Grid environment. Based on the above mentioned challenges with Grid Computing Security a proposed conceptual model has been designed to solve these issues. The various models were implemented and tested to evaluate their performance.
STUDY OF DIFFERENT SECURITY ISSUES ON GRID COMPUTING
Grid computing provides high computing power, enormous data storage, and collaboration possibilities to its users. A Computational Grid is a collection of heterogeneous computers and resources spread across multiple administrative domains with the intent of providing users uniform access to these resources. There are many ways to access the resources of a Computational Grid, each with unique security requirements and implications for both the resource user and the resource provider. A comprehensive set of Grid usage scenarios are presented and analyzed with regard to security requirements such as authentic cation , authorization, integrity, and confidentiality. The main value of these scenarios and the associated security discussions are to provide a library of situations against which an application designer can match, thereby facilitating security-aware application use and development from the initial stages of the application design and invocation. A broader goal of these scenarios are to increase the awareness of security issues in Grid Computing. In the networked access to computation with a single-sign-on system as the portal to the possibilities of world wide computing grids security plays an important role. Keywords: Grid Computing, Security, Intrusion detection system etc
Developing a Secure Grid Computing Environment Shell
2004
We describe the design and features of our Grid Computing Environments Shell system, or GCEShell. We view computing Grids as providing essentially a globally scalabledistributed operating system that exposes low level programming APIs. From thesesystem-level commands we may build a higher level library of more user-friendly shellcommands, which may in turn be programmed through scripts.
Unlike other computer systems, the grid computation stands for systematically interrelated heterogeneous computers and computing resources under a multiple management and administrative domains. Such varyingly varying computational resources in the name of grid computing only aim at providing the users easy access to the resources. One can utilize number of ways to get access to those resources and developers can utilize different architecture to build the grids. While the constructional architecture of these grid computers are by large different in terms of their implications, objectivity and usage; researchers found grid computing security to be a major field to study and experiment. Contemporary research efforts should that the objectivity variance and implicational architectural variation among different grid computing architecture are right to be perceived as the key reason of security concerns. More explorative study of these architectures and further research on grid computing security revealed that researchers can in many instances overcome the architectural differences in security variations but they cannot completely ensure protection. This paper studies Legion, Globus, CRISIS architecture of grid computing to explore what else is impacting the grid computing security performance. Is it users usage of the grid computing that is causing security vulnerability of the system? What aspects of users usage of grid computing are actually impacting the grid computers security performance? Is there any way to overcome the situation? This paper systematically attempts to find all the answers.