A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
A Policy Service for GRID Computing
GRID '02 Proceedings of the Third International Workshop on Grid Computing
Security Implications of Typical Grid Computing Usage Scenarios
HPDC '01 Proceedings of the 10th IEEE International Symposium on High Performance Distributed Computing
Forensic Discovery
Globus® Toolkit 4, First Edition: Programming Java Services (The Morgan Kaufmann Series in Networking)
Secure deletion of data from magnetic and solid-state memory
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Scope of forensics in grid computing – vision and perspectives
ISPA'06 Proceedings of the 2006 international conference on Frontiers of High Performance Computing and Networking
Hi-index | 0.00 |
The grid security architecture today does not prevent certain unauthorized access to the files associated with a job executing on a remote machine. Programs and data are transferred to a remote machine for completing staging jobs. Footprints may remain on the machine after the programs and data are deleted from the remote machine. Anyone with super user privileges can access these footprints. In this paper, we explore the problem of unauthorized access to programs and data, supporting it with experiments carried out using the Globus toolkit. After showing that programs and data are at risk, we also discuss ways for secure deletion of data and programs on the remote machine.