Grid Security: Lessons for Peer-to-Peer Systems

  • Authors:
  • Mike Surridge;Colin Upstill

  • Affiliations:
  • -;-

  • Venue:
  • P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

The vision of the Grid is to provide a computational infrastructure supporting flexible, secure, coordinated resource sharing among dynamic collections of individuals, institutions, and resources [1]. Interest in the Grid has increased as major science programmes look to Grid technology to provide for their computing needs. This has led to substantial investment in the Grid by vendors and governments, notably through the UK e-Science programme and similar programmes in other nations, and more recently at European level. As a result, far more people are joining the effort to develop Grid infrastructure and applications.The Grid by its nature involves access to computer systems and data outside one's own company or institution. Security is therefore a major element in any Grid infrastructure, as it is necessary to ensure that only authorised access is permitted. However, early developments of the Grid were strongly motivated by the performance benefits of sharing resources, and Grid security models were designed not to interfere with this. We show by comparison with mainstream e-Commerce experience that early Grid security models exhibit several weaknesses [2].The early development of the Grid also largely failed to take account of operational realities such as network administrator responsibilities and network devices such as firewalls. Early Grid systems were simply not operable outside academic institutions and closed research networks, and we contend that the most common strategy for making them work "in the real world" represents a short-term fix that is likely to produce conflict between users and application developers on the one hand, and those responsible for network administrationand security on the other. We believe that the peer-to-peer community is also likely to face similar conflicts between its decentralised management approach and the day-to-day concerns of those entrusted to maintain our security.IT Innovation is playing a leading role in the UK E-Science Programme and the exploitation of Grids for industrial and commercial purposes in the European Framework programmes. We have found it necessary to propose and begin development of radical solutions to some of these problems, including "proxy-free" delegation models and semantically-aware firewalls.