Grid and Cloud Computing Security: A Comparative Survey (original) (raw)

COMPARISON OF DATA SECURITY IN GRID AND CLOUD COMPUTING

In the current era, Grid computing and cloud computing are the main fields in the research work. This thesis define which are the main security issues to be considered in cloud computing and grid computing, and how some of these security issues are solved. Comparative study shows the grid security is tighter than the cloud. It also shows cloud computing is less secure and faced security problems. This research work is based on main security problems in cloud computing such as authentication, authorization, access control and security infrastructure (SLA). Cloud infrastructure is based on service level agreement; simply cloud providers provide different services to cloud's users and organizations with an agreement known SLA. So the security and privacy of user's data is the main problem, because unauthorized person can't access the data of cloud user. Hacking and data leakage are the common threats in cloud computing. As the security due to hackers increase over internet and the cloud computing is totally on internet. At this time, cloud computing demand the tight password protection and strong authentication and authorization procedure. For an increased level of security, privacy and password protection, we provide a new strong authentication model named "Two factor authentications using graphical password with pass point scheme". This authentication model includes the login procedure, access control that is based on service level agreement (SLA) in cloud computing.

Optimizing grid and cloud computing infrastructures to handle security and access control challenges

PROCEEDINGS OF THE 14th ANNUAL CONFERENCE ON WORLD WIDE WEB APPLICATIONS, 2012

Grid computing has been in operation for some years now. It has unique characteristics which distinguishes it from other distributed systems. It offers distribution of resources across multiple administrative domains. This feature has enhanced the distribution, sharing and allocation of various computer resources by organisations. Grid computing has provided security to some extent to various resources on its platform. Cloud computing on the other hand could be regarded as an enhanced version of utility computing. It could be regarded as a universal term for computing technology that has to do with providing, delivering, distributing as well as transporting various hosted services over the Internet. Cloud computing is however, faced by some security challenges. Innovations in distributed systems and virtualization as well as the improved demand for efficient high speed Internet have accelerated demand for the application of both grid computing and cloud computing. Notwithstanding the benefit of cloud computing the challenge is security. In this paper, the various security challenges for both technologies is analysed and a secure architecture for a cloud based environment is proposed, using existing generic grid access control architectures.

STUDY OF DIFFERENT SECURITY ISSUES ON GRID COMPUTING

Grid computing provides high computing power, enormous data storage, and collaboration possibilities to its users. A Computational Grid is a collection of heterogeneous computers and resources spread across multiple administrative domains with the intent of providing users uniform access to these resources. There are many ways to access the resources of a Computational Grid, each with unique security requirements and implications for both the resource user and the resource provider. A comprehensive set of Grid usage scenarios are presented and analyzed with regard to security requirements such as authentic cation , authorization, integrity, and confidentiality. The main value of these scenarios and the associated security discussions are to provide a library of situations against which an application designer can match, thereby facilitating security-aware application use and development from the initial stages of the application design and invocation. A broader goal of these scenarios are to increase the awareness of security issues in Grid Computing. In the networked access to computation with a single-sign-on system as the portal to the possibilities of world wide computing grids security plays an important role. Keywords: Grid Computing, Security, Intrusion detection system etc

GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES STUDY OF DIFFERENT SECURITY ISSUES ON GRID COMPUTING

Grid computing provides high computing power, enormous data storage, and collaboration possibilities to its users. A Computational Grid is a collection of heterogeneous computers and resources spread across multiple administrative domains with the intent of providing users uniform access to these resources. There are many ways to access the resources of a Computational Grid, each with unique security requirements and implications for both the resource user and the resource provider. A comprehensive set of Grid usage scenarios are presented and analyzed with regard to security requirements such as authentic cation , authorization, integrity, and confidentiality. The main value of these scenarios and the associated security discussions are to provide a library of situations against which an application designer can match, thereby facilitating security-aware application use and development from the initial stages of the application design and invocation. A broader goal of these scenarios are to increase the awareness of security issues in Grid Computing. In the networked access to computation with a single-sign-on system as the portal to the possibilities of world wide computing grids security plays an important role.

Improving the Security on Grid COmputing

The purpose for this paper was to come out with a theoretical framework to standardize the solutions to the existing security challenges in Grid computing. The principal objectives were to contribute to ongoing research to help improve its security measures.

Authentication mechanisms in grid computing environment: Comparative study

2012 International Conference on Engineering and Technology (ICET), 2012

For the reason that grid resources are valuable, access is usually limited, based on the requested resource and the requesting user's identity. Authentication in distributed systems like grid computing environment is the first defense line before other security aspects; authorization, confidentiality, integrity and auditing. The main grid authentication mechanisms challenges are single sign-on, secure credential repositories, and cross-domain authentication. This paper presents a comparative study of various authentication mechanisms in grid computing environment to investigate their pros and cons. Such analysis is particularly relevant for those seeking an intensive assessment to appropriate grid authentication mechanisms.

Improving Security Measures on Grid Computing

The purpose of this project was to come out with a theoretical framework to standardize the solutions to the existing security challenges. The principal objectives were to contribute to the ongoing research to help improve the security measures on grid computing. Hypervisor security model, Host/Platform security model, Security Communication model and Security between Guests were developed and implemented. The major finding derived from this study suggests that Grid Computing Security can have challenges in the following areas: Authentication and Authorization of users, integration to other exiting systems and enforcing trust policies within dynamic Grid environment. Based on the above mentioned challenges with Grid Computing Security a proposed conceptual model has been designed to solve these issues. The various models were implemented and tested to evaluate their performance.

Security in Grid Computing

Unlike other computer systems, the grid computation stands for systematically interrelated heterogeneous computers and computing resources under a multiple management and administrative domains. Such varyingly varying computational resources in the name of grid computing only aim at providing the users easy access to the resources. One can utilize number of ways to get access to those resources and developers can utilize different architecture to build the grids. While the constructional architecture of these grid computers are by large different in terms of their implications, objectivity and usage; researchers found grid computing security to be a major field to study and experiment. Contemporary research efforts should that the objectivity variance and implicational architectural variation among different grid computing architecture are right to be perceived as the key reason of security concerns. More explorative study of these architectures and further research on grid computing security revealed that researchers can in many instances overcome the architectural differences in security variations but they cannot completely ensure protection. This paper studies Legion, Globus, CRISIS architecture of grid computing to explore what else is impacting the grid computing security performance. Is it users usage of the grid computing that is causing security vulnerability of the system? What aspects of users usage of grid computing are actually impacting the grid computers security performance? Is there any way to overcome the situation? This paper systematically attempts to find all the answers.

Grid Computing Security: A Survey

2011

This paper provides a survey of Security in the computational grid environment. A computational grid is collection of heterogeneous computers and resources spread across multiple administrative domains with the intent of providing users easy access to the resources. There may be many way to access the resources of computational grid, each with security requirements for both resource user and resource provider. There are many security issues in the Grid Computing Environment mentioned in [4]. So the main goal of this paper is to provide the information about security, security issues in the grid computing environment and also analyzes security problems existing in Grid Computing System and describes the security mechanism in Grid Computing System

Security Standards and Issues for Grid Computing

IGI Global eBooks, 2012

Security in grid environments that are built using Service Oriented Architecture (SOA) technologies is a great challenge. On one hand, the great diversity in security technologies, mechanisms and protocols that each organization follows and on the other hand, the different goals and policies that these organizations adopt, comprise a complex security environment. Authenticating and authorizing users and services, identity management in a multi-organizational scenario and secure communication define the main context of the problem. In this chapter, we provide an overview of the security protocols and technologies that can be applied on a Web Service (WS) based grid environment.