A review of grid authentication and authorization technologies and support for federated access control

  • Authors:
  • Wei Jie;Junaid Arshad;Richard Sinnott;Paul Townend;Zhou Lei

  • Affiliations:
  • Thames Valley University, London, U.K.;University of Leeds, Leeds, U.K.;University of Glasgow, Melbourne, Australia;University of Leeds, Leeds, U.K.;Shanghai University, Shanghai, China

  • Venue:
  • ACM Computing Surveys (CSUR)
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Grid computing facilitates resource sharing typically to support distributed virtual organizations (VO). The multi-institutional nature of a grid environment introduces challenging security issues, especially with regard to authentication and authorization. This article presents a state-of-the-art review of major grid authentication and authorization technologies. In particular we focus upon the Internet2 Shibboleth technologies and their use to support federated authentication and authorization to support interinstitutional sharing of remote grid resources that are subject to access control. We outline the architecture, features, advantages, limitations, projects, and applications of Shibboleth in a grid environment. The evidence suggests that Shibboleth meets many of the demands of the research community in accessing and using grid resources.