Abstract
The vision of having access to tremendous amounts of computation and storage resources on demand, together with access to special devices, similar to the availability of today’s power grids has been formulated by Ian Foster and Carl Kesselman in [1] in 1997 and since then has been known by the term Grid computing.
As this vision slowly became reality and we’re now at the verge to having Grids production ready not only for scientific communities but also for industrial partners security, accounting and billing are now major concerns that need to be reflected and further improved.
This paper analyzes two of the major local resource managers, Condor [2] and Torque[3], that are being used as local resource managers in the major grid middlewares Globus [4,5,6,7,8] as well as in the gLite and LCG [9,10] software stack with respect of being able to track malicious jobs and enforce a site policy.
As weaknesses have been found we also present an approach that is capable of truly tracking any kind of job.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Foster, I., Kesselman, C.: Globus: A metacomputing infrastructure toolkit. The International Journal of Supercomputer Applications and High Performance Computing 11(2), 115–128 (1997)
Litzkow, M., Livny, M., Mutka, M.: Condor - a hunter of idle workstations. In: Proceedings of the 8th International Conference of Distributed Computing Systems (1988)
Torque resource manager 2.0, http://www.clusterresources.com/pages/products/
Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the grid: Enabling scalable virtual organizations. International J. Supercomputer Applications 15(3) (2001)
Foster, I., Kesselman, C.: Globus: A metacomputing infrastructure toolkit. The International Journal of Supercomputer Applications and High Performance Computing 11(2), 115–128 (1997)
Foster, I., Kesselman, C. (eds.): The grid: blueprint for a new computing infrastructure. Morgan Kaufmann Publishers Inc., San Francisco (1999)
Foster, I., Kesselman, C.: Computational Grids. In: Palma, J.M.L.M., Dongarra, J., Hernández, V. (eds.) VECPAR 2000. LNCS, vol. 1981, pp. 3–37. Springer, Heidelberg (2001)
Foster, I., Kesselman, C., Nick, J., Tuecke, S.: The physiology of the grid: An open grid services architecture for distributed systems integration (2002)
gLite - Lightweight Middleware for Grid Computing, http://www.glite.org/
LCG - LHC Computing Grid Project, http://lcg.web.cern.ch/LCG/
LSF - Load Sharing Facility, http://accl.grc.nasa.gov/lsf/
Microsystems, W.G.S.: Sun grid engine: Towards creating a compute power grid. In: CCGRID 2001: Proceedings of the 1st International Symposium on Cluster Computing and the Grid, Washington, DC, USA, p. 35. IEEE Computer Society, Los Alamitos (2001)
OpenPBS - The Portable Batch System Software, http://www.altair.com/software/
Stevens, W.R.: Advanced programming in the UNIX environment. Addison Wesley Longman Publishing Co., Inc., Redwood City (1992)
Tannenbaum, T., Wright, D., Miller, K., Livny, M.: Condor – a distributed job scheduler. In: Sterling, T. (ed.) Beowulf Cluster Computing with Linux. MIT Press, Cambridge (2001)
Mauerer, W.: Linux Kernelarchitektur. Hanser Fachbuchverlag (2003)
Goldberg, I., Wagner, D., Thomas, R., Brewer, E.A.: A secure environment for untrusted helper applications. In: Proceedings of the 6th Usenix Security Symposium, San Jose, CA, USA (1996)
Wagner, D.A.: Janus: an approach for confinement of untrusted applications. Technical Report UCB/CSD-99-1056, EECS Department, University of California, Berkeley (1999)
Garfinkel, T.: Traps and pitfalls: Practical problems in system call interposition based security tools. In: Proc. Network and Distributed Systems Security Symposium (2003)
Jain, K., Sekar, R.: User-level infrastructure for system call interposition: A platform for intrusion detection and confinement. In: NDSS, The Internet Society (2000)
Provos, N.: Improving host security with system call policies. In: Proceedings of the 12th USENIX Security Symposium (2003)
Loscocco, P., Smalley, S.: Integrating flexible support for security policies into the linux operating system. In: Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, Berkeley, CA, USA, USENIX Association, pp. 29–42 (2001)
Smalley, S., Fraser, T., Vance, C.: Linux security modules: General security hooks for Linux (2003), http://lsm.immunix.org/docs/overview/linuxsecuritymodule.html
Spencer, R., Smalley, S., Loscocco, P., Hibler, M., Andersen, D., Lepreau, J.: The Flask Security Architecture: System Support for Diverse Security Policies. In: Proc. 8th USENIX Security Symposium, Washington, DC (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rosmanith, H., Praxmarer, P., Kranzlmüller, D., Volkert, J. (2006). Towards Job Accounting in Existing Resource Schedulers: Weaknesses and Improvements. In: Gerndt, M., Kranzlmüller, D. (eds) High Performance Computing and Communications. HPCC 2006. Lecture Notes in Computer Science, vol 4208. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11847366_74
Download citation
DOI: https://doi.org/10.1007/11847366_74
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-39368-9
Online ISBN: 978-3-540-39372-6
eBook Packages: Computer ScienceComputer Science (R0)