Security Implications of Typical Grid Computing Usage Scenarios

  • Authors:
  • Marty Humphrey;Mary R. Thompson

  • Affiliations:
  • Computer Science Department, University of Virginia, Charlottesville, VA 22904, USA;Distributed Security Research Group, Lawrence Berkeley National Laboratory, Berkeley, CA 94720, USA

  • Venue:
  • Cluster Computing
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

Grid Computing consists of a collection of heterogeneous computers and resources spread across multiple administrative domains with the intent of providing users uniform access to these resources. There are many ways to access the resources of a Grid, each with unique security requirements and implications for both the resource user and the resource provider. A comprehensive set of Grid usage scenarios is presented and analyzed with regard to security requirements such as authentication, authorization, integrity, and confidentiality. The main value of these scenarios and the associated security discussions is to provide a library of situations against which an application designer can match, thereby facilitating security-aware application use and development from the initial stages of the application design and invocation. A broader goal of these scenarios is to increase the awareness of security issues in Grid Computing.