The Community for Technology Leaders
2008 IEEE Fourth International Conference on eScience (2008)
Indianapolis, IN
Dec. 7, 2008 to Dec. 12, 2008
ISBN: 978-1-4244-3380-3
pp: 79-86
ABSTRACT
The security models used in Grid systems today strongly bear the marks of their diverse origin. Historically retrofitted to the distributed systems they are designed to protect and control, the security model is usually limited in scope and applicability, and its implementation tailored towards a few specific deployment scenarios. A common approach towards even the "basic" elements such as authentication to resources is only now emerging, whereas for more complex issues such as community organization, integration of site access control with operating systems, cross-domain resource provisioning, or overlay community Grids ("late authentication" for pilot job frameworks or community-based virtual machines) there is no single coherent and consistent "security" view. Via this paper we aim to share some observations on current security models and solutions found in Grid architectures and deployments today and identify architectural limitations in solving complex access control and policy enforcement scenarios in distributed resource management. The paper provides a short overview of the OGSA security services and other security solutions used in Grid middleware and operations practice. However, it is becoming clear that further development in Grid requires a fresh look at the concepts, both operationally and security-wise. This paper analyses the security aspects of different types of Grids and a set of use cases that may require extended security functionality, such as dynamic security context management, and management of stateful services. Recent developments in open systems security, and revisiting basic security concepts in networking and computing including the OSI Security Architecture and the concepts used in the Trusted Computing Base provide interesting examples on how some of the conceptual security problems in Grid can be addressed, and on how the shortcomings of current systems and the frequently proposed "ad-hoc" stop-gaps for what are in fact complex security manageability problems may be avoided. This paper is thus intended to initiate and stimulate the wider discussion on the concepts of Grid security, thereby setting the scene for and providing input to a Grid security taxonomy leading to a more consistent Grid Security Architecture.
INDEX TERMS
Grids, Open Grid Security Architecture, Trusted Computing Base, Reference Monitor, Security models, Security Context, Authentication, Authorisation session
CITATION
David Groep, Yuri Demchenko, Oscar Koeroo, Cees de Laat, "Re-thinking Grid Security Architecture", 2008 IEEE Fourth International Conference on eScience, vol. 00, no. , pp. 79-86, 2008, doi:10.1109/eScience.2008.53
161 ms
(Ver 3.3 (11022016))