Scope of forensics in grid computing – vision and perspectives

  • Authors:
  • Syed Naqvi;Philippe Massonet;Alvaro Arenas

  • Affiliations:
  • Centre of Excellence in Information and Communication Technologies (CETIC), Belgium;Centre of Excellence in Information and Communication Technologies (CETIC), Belgium;CCLRC Rutherford Appleton Laboratory, United Kingdom

  • Venue:
  • ISPA'06 Proceedings of the 2006 international conference on Frontiers of High Performance Computing and Networking
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Along with the evolution of Grid technology, the need to protect its resources from malicious activities is becoming more and more important. While robust security architecture provides deterrence, there never be a perfect security mechanism. The Grid security teams must be able to tackle the postattack situation and should be able to read the black-box of the events that led to the failure of the security architecture. Moreover, they should be able to collect the fingerprints of the culprits behind the attack so that necessary legal and judicial actions could be taken. It is only possible when the specific nature of the Grid is kept in mind while developing its forensics techniques. Grid is anewer paradigm and still lacks a number of security features. There is no other work in our knowledge that addresses forensics issues of the grid. This vacuum has overwhelmingly motivated us to take some initiative to fill this gap.