skip to main content
10.1145/1028493.1028502acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmiddlewareConference Proceedingsconference-collections
Article

Towards a flexible security framework for peer-to-peer based grid computing

Published: 18 October 2004 Publication History

Abstract

The dynamic, multi-organization nature of large-scale grid computing introduces security issues that must be addressed before grid systems can become widely popular. This paper proposes P2PSLF (Peer-to-Peer Security Layer Framework), a flexible security framework for peer-to-peer based grid computing. P2PSLF provides a wide range of security mechanisms (e.g., authentication, confidentiality, integrity, authorization, and audit), and allows the creation of new ones. It is independent of the overlying application, which enables new systems to be implemented without having to deal with security issues within the application. In addition, the framework is modular and reconfigurable. The set of security requirements to be satisfied in communications is determined per peer, and can be changed without recompiling the application. The framework is exercised using OurGrid, a P2P-based middleware that enables the creation of a multi-organization grid computing environment for the execution of bag-of-tasks applications.

References

[1]
Abramson, D., Buyya, R., and Giddy, J. A computational economy for grid computing and its implementation in the Nimrod-G resource broker. Future Generation Computer Systems (FGCS) Journal 18 (2002), 1061--1074
[2]
Andrade, N., Cirne, W., Brasileiro, F. V. and Roisenberg, P. OurGrid: An Approach to Easily Assemble Grids with Equitable Resource Sharing. In Proceedings of the 9th International Job Scheduling Strategies for Parallel Processing (JSSPP), June 2003.
[3]
Andrade, N., Mowbray, M., Cirne, W. and Brasileiro, F. When Can an Autonomous Reputation Scheme Discourage Free-riding in a Peer-to-Peer System? 4th International Workshop on Global and Peer-to-Peer Computing, April 2004.
[4]
C language binding for JXTA core, http://jxta-c.jxta.org/.
[5]
Globus Toolkit, http://www.globus.org/.
[6]
JAL:JXTA Abstraction Layer, http://ezel.jxta.org/jal.html.
[7]
JXTA Python binding, http://jxtapy.jxta.org/.
[8]
Lawton, G. Is Peer-to-Peer Secure Enough for Corporate Use?, In IEEE Computer, pp. 22--25, vol 37, number 1, January 2004
[9]
OpenSource Certification Authority Toolkit, http://www.openca.org/openca/.
[10]
OurGrid, http://www.ourgrid.org/.
[11]
Paranhos D., Cirne, W., Brasileiro, F. Trading Cycles for Information: Using Replication to Schedule Bag-of-Tasks Applications on Computational Grids, Proceedings of the Euro-Par 2003: International Conference on Parallel and Distributed Computing, August 2003
[12]
Project JXTA, http://www.jxta.org/.
[13]
Talia, D., Trunfio, P. Toward a Synergy Between P2P and Grids. In IEEE Internet Computing. vol 7, number 4, pp 94--95. August 2003
[14]
The Peer-to-Peer Trusted Library, http://sourceforge.net/projects/ptptl
[15]
Welch, V., Siebenlist, F., Foster, I., Bresnahan, J., Czajkowski, K., Gawor, J., Kesselman, C., Meder, S., Pearlman, L. and Tuecke, S. Security for Grid Services, IEEE Twelfth International Symposium on High Performance Distributed Computing (HPDC-12), June 2003.

Cited By

View all
  • (2013)A Hybrid System for Authentication ServiceProceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems10.1109/INCoS.2013.156(821-826)Online publication date: 9-Sep-2013
  • (2012)Towards achieving scalability and interoperability in a triple-domain grid-based environment (3DGBE)2012 Information Security for South Africa10.1109/ISSA.2012.6320440(1-10)Online publication date: Aug-2012
  • (2009)A Trust-Based Access Control Management Framework for a Secure Grid EnvironmentSecurity in Distributed, Grid, Mobile, and Pervasive Computing10.1201/9780849379253.ch13(289-314)Online publication date: 23-Nov-2009
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
MGC '04: Proceedings of the 2nd workshop on Middleware for grid computing
October 2004
92 pages
ISBN:1581139500
DOI:10.1145/1028493
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 October 2004

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. JXTA
  2. OurGrid
  3. P2P
  4. middleware
  5. security

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 14 of 36 submissions, 39%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2013)A Hybrid System for Authentication ServiceProceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems10.1109/INCoS.2013.156(821-826)Online publication date: 9-Sep-2013
  • (2012)Towards achieving scalability and interoperability in a triple-domain grid-based environment (3DGBE)2012 Information Security for South Africa10.1109/ISSA.2012.6320440(1-10)Online publication date: Aug-2012
  • (2009)A Trust-Based Access Control Management Framework for a Secure Grid EnvironmentSecurity in Distributed, Grid, Mobile, and Pervasive Computing10.1201/9780849379253.ch13(289-314)Online publication date: 23-Nov-2009
  • (2009)A Peer-to-Peer Federated Authentication SystemProceedings of the 2009 Sixth International Conference on Information Technology: New Generations10.1109/ITNG.2009.159(382-387)Online publication date: 27-Apr-2009
  • (2009)Security System for Overlapping Non-dedicated Clusters2009 IEEE International Symposium on Parallel and Distributed Processing with Applications10.1109/ISPA.2009.19(272-281)Online publication date: Aug-2009
  • (2009)Design and Implementation of Security Mechanisms for a Hierarchical Community-Based Multi-Agent SystemAgent Computing and Multi-Agent Systems10.1007/978-3-642-01639-4_12(134-145)Online publication date: 21-Apr-2009
  • (2007)Pre-execution security policy assessment of remotely defined BPEL-based grid processesProceedings of the 4th international conference on Trust, Privacy and Security in Digital Business10.5555/2392055.2392081(178-189)Online publication date: 4-Sep-2007
  • (2007)Identity Anonymity for Grid Computing Coordination based on Trusted ComputingProceedings of the Sixth International Conference on Grid and Cooperative Computing10.1109/GCC.2007.77(403-410)Online publication date: 16-Aug-2007
  • (2007)Pre-execution Security Policy Assessment of Remotely Defined BPEL-Based Grid ProcessesTrust, Privacy and Security in Digital Business10.1007/978-3-540-74409-2_20(178-189)Online publication date: 2007
  • (2006)An Integrated Framework for Trust-Based Access Control for Open Systems2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing10.1109/COLCOM.2006.361901(1-11)Online publication date: Nov-2006
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media