The Trellis security infrastructure for overlay metacomputers and bridged distributed file systems

  • Authors:
  • Paul Lu;Michael Closson;Cam Macdonell;Paul Nalos;Danny Ngo;Morgan Kan;Mark Lee

  • Affiliations:
  • Department of Computing Science, University of Alberta, Edmonton, Alta., Canada;Department of Computing Science, University of Alberta, Edmonton, Alta., Canada;Department of Computing Science, University of Alberta, Edmonton, Alta., Canada;Department of Computing Science, University of Alberta, Edmonton, Alta., Canada;Department of Computing Science, University of Alberta, Edmonton, Alta., Canada;Department of Computing Science, University of Alberta, Edmonton, Alta., Canada;Department of Computing Science, University of Alberta, Edmonton, Alta., Canada

  • Venue:
  • Journal of Parallel and Distributed Computing - Special issue: Security in grid and distributed systems
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Researchers often have non-privileged access to a variety of high-performance computer (HPC) systems in different administrative domains, possibly across a wide-area network. Consequently, the security infrastructure becomes an important component of an overlay metacomputer: a user-level aggregation of HPC systems. The Trellis security infrastructure (TSI) is layered on top of the widely-deployed secure shell (SSH) and systems administrators only need to provide unprivileged accounts to the users. The contribution of TSI is in demonstrating that a single sign-on (SSO) system, for a variety of use-case scenarios, can be implemented without requiring a completely new security infrastructure. We describe the use of TSI for a Canada-wide overlay metacomputer, for computational workloads (i.e., CISS-3) that spanned 22 administrative domains, at its peak had over 4000 concurrent jobs, and included a new distributed file system (i.e., Trellis NFS).