Abstract
Grid technology is increasingly being looked upon as a natural extension of the internet for engaging in complex data processing tasks over resources which are distributed across the world. Architects and developers employing grid systems must take into consideration security implications. Dynamic generation of virtual organizations leads to a synergistic picture which has to address security requirements never encountered before. Globus toolkit has devised a framework for making secure use of grid resource components which has been proved to be a feasible solution by a number of academic and scientific organizations. This paper is an attempt to identify and discern mechanisms proposed by Globus security model with certain test scenarios.
- Ian Foster, Carl Kesselman, Steven Tuecke, "The Anatomy of Grid Enabling Scalable Virtual Organizations", online at http://www.globus.org/alliance/publications/papers/anatomy.pdfGoogle Scholar
- Ian Foster, Carl Kesselman, Jeffrey M. Nick, Steven Tuecke, "The Physiology of the Grid, An Open Grid Services Architecture for Distributed Systems Integration", online at http://www.globus.org/alliance/publications/papers/ogsa.pdfGoogle Scholar
- Ian Foster, Carl Kesselman, Gene Tsudik, Steven Tsuecke, "A Security Architecture for Computational Grids," Proceedings of the 5th ACM Conference on Computer and Communications Security, 1998, pp 83--92. Google ScholarDigital Library
- Zsolt Nemeth, Vaidy Sunderam, "A comparison of Conventional Distributed Computing Environments and Computational Grids," online at http://www.mathcs.emory.edu/dcl/h2o/papers/grids_iccs02.pdfGoogle Scholar
- Nataraj Nagaratnam, Philippe Janson, John Dayka, Anthony Nadalin, Frank Siebenlist, Von Welch, Ian Foster, Steve Tuecke, "The Security Architecture for Open Grid Services", online at http://www.cs.virginia.edu/~humphrey/ogsa-sec-wg/OGSA-SecArch-v1-07192002.pdfGoogle Scholar
- Jim Basney, "Using the MyProxy Online Credential Repository", online at http://www.globusworld.org/2005Slides/Session%204b(2).pdfGoogle Scholar
- Olivier Chevassut, "Secure (one -time-)Password Authentication for the Globus Toolkit", online at http://www.globusworld.org/2005Slides/Session%207b(3).pdfGoogle Scholar
- http://www.globus.org/toolkit/docs/3.2/installation/index.htmlGoogle Scholar
- http://www.globus.org/toolkit/docs/3.2/installation/install_config.htmlGoogle Scholar
Index Terms
- Globus security model for grid environment
Recommendations
Grid-enabling applications in a heterogeneous environment with globus and condor
MG '08: Proceedings of the 15th ACM Mardi Gras conference: From lightweight mash-ups to lambda grids: Understanding the spectrum of distributed computing requirements, applications, tools, infrastructures, interoperability, and the incremental adoption of key capabilitiesThe authors Grid-enabled several test applications to conduct experiments that used the Condor Job Manager to schedule code execution across both Globus and Condor resources. Using Condor to manage Globus Grid services in addition to local Condor pools (...
Comments