This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Grid Computing Security: A Taxonomy
January/February 2008 (vol. 6 no. 1)
pp. 44-51
Anirban Chakrabarti, Infosys Technologies
Anish Damodaran, Infosys Technologies
Shubhashis Sengupta, Infosys Technologies
Grid computing helps us overcome heterogeneity in terms of computing elements, operating systems, policy decisions, and environments. However, security issues impede us from adopting the grid as a widespread IT virtualization solution, so we must develop solutions to address these issues.

1. I. Foster and C. Kasselman, The Grid 2: Blueprint for a New Computing Infrastructure, Morgan Kaufmann, 2004.
2. G.C. Necula and P. Lee, "Research on Proof-Carrying Code for Untrusted-Code Security," Proc. IEEE Symp. Security and Privacy (SSP), IEEE CS Press, 1997, p. 204.
3. P. Barham et al., "Xen and the Art of Virtualization," ACM Symp. Operating System Principles (SOSP), ACM Press, 2003, pp. 164–177.
4. R. Uhlig et al., "Intel Virtualization Technology," Computer, vol. 38, no. 5, 2005, pp. 48–56.
5. A. Berman, V. Bourassa, and E. Selberg, "TRON: Process-Specific File Protection for the UNIX Operating System," Proc. Usenix Technical Conf. UNIX and Advanced Computing Systems, Usenix, 1995, pp. 14–24.
6. GGF document, "Advanced Reservation: State of the Art," ggf-draft-sched-graap-2.0, June 2003.
7. V. Welch et al., "Security for Grid Services," Proc. IEEE Int'l Symp. High Performance Distributed Computing, IEEE CS Press, 2003, pp. 48–57.
8. A. Nadalin et al., Web Services Security: SOAP Message Security 1.1, OASIS standard specification, Feb. 2006; www.oasisopen.org/committees/download.php/ 16790wss-v1.1-spec-os-SOAPMessageSecurity.pdf .
9. S. Anderson et al., Web Services Secure Conversation Language (WS-SecureConversation)," OASIS specification, May 2005.
10. C. Adams and S. Farrell, "Internet X.509 Public Key Infrastructure," IETF RFC 2510, Mar. 1999; www.ietf.org/rfcrfc2510.txt?number=2510.
11. E. Maler, Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML), OASIS standard, Nov. 2002; www.oasis-open.org/committees/download.php/ 3406oasis-sstc-saml-core-1.1.pdf.
12. T. Moses, ed., eXtensible Access Control Markup Language (XACML) Version 2.0, OASIS standard; http://docs.oasis-open.org/xacml/2.0access_control-xacml-2.0-core-spec-os.pdf .
13. S.S. Mudumbai et al., "Design and Implementation Issues for Distributed Access Control," Proc. 14th Ann. Computer Security and Applications Conf. (ACSAC), IEEE CS Press, 1998; http://dsd.lbl.gov/security/Akentiakenti_design_implementation_issues_csac.pdf .
14. I. Foster et al., "Community Authorization Service: Status and Future," Proc. Comping in High Energy Physics (CHEP), Mar. 2003; www.globus.org/alliance/publications/papers CAS_update_CHEP_03-final.pdf.
15. R. Alfieri et al., "From Gridmap-File to VOMS: Managing Authorization in a Grid Environment," Future Generation Computer Systems, vol. 21, no. 4, 2005, pp. 549–558.
16. S. Kenny and B. Coghlan, "Towards a Grid-Wide Intrusion Detection System," Proc. European Grid Conference (EGC), Springer, 2005, pp. 275–284.
17. A. Chakrabarti and G. Manimaran, "Internet Infrastructure Security: A Taxonomy," IEEE Networks, vol. 16, no. 6, 2002, pp. 13–21.
18. J. Basney, M. Humphrey, and V. Welch, "The MyProxy Online Credential Repository," Software—Practice &Experience, vol. 35, no. 9, 2005, pp. 801–816.
19. V. Welch et al., "Attributes, Anonymity, and Access: Shibboleth and Globus Integration to Facilitate Grid Collaboration," Proc. 4th Ann. PKI R&D Workshop, 2005; http://middleware.internet2.edu/pki05/proceedings welch-globus-shibboleth.pdf.
20. A. Chakrabarti, Grid Computing Security, Springer-Verlag, 2007.

Index Terms:
grid computing, grid security, Grid, Security, Sandboxing, Virtualization, Authorization, GSI, Certificates, Denial-of-Service, Credentials
Citation:
Anirban Chakrabarti, Anish Damodaran, Shubhashis Sengupta, "Grid Computing Security: A Taxonomy," IEEE Security & Privacy, vol. 6, no. 1, pp. 44-51, Jan.-Feb. 2008, doi:10.1109/MSP.2008.12
Usage of this product signifies your acceptance of the Terms of Use.