Professional Documents
Culture Documents
Computational Grids
Foster, Kesselman, Tsudik, and
Tuecke
Presented by Mike Copenhafer
March 3, 2000
3.2.00
Motivation
Grids have unique characteristics:
large number of heterogeneous resources
dynamic resource requirements
multiple administrative domains
3.2.00
An Example
3.2.00
The Problem
How do we permit these computations to
operate in a secure and transparent fashion?
Methodology:
requirements => policy => architecture
3.2.00
Requirements
Single sign-on
Interoperability with local security
Exportability
Secure group communication
Flexible policy
3.2.00
A resource
A resource
A resource
A resource
A resource
Subject
3.2.00
Object
Trust Domain
Trust Domain 1
3.2.00
A resource
Trust Domain 2
7
Trust Domain
A resource
A resource
A resource
3.2.00
3.2.00
3.2.00
10
User Proxy
A process which acts in place of the user
Uses its own credentials
Lifetime controlled by user
3.2.00
11
Resource Proxy
Translates interdomain security operations
to local security operations and vice versa
A resource
RP
A resource
Plaintext->SSL
Domain 1 (Plaintext)
Domain 2 (SSL)
12
The Protocols
Support for authentication only
No encrypted channels (exportable)
3.2.00
13
Discussion:
Determining validity interval, set of hosts?
Implications of temporary credential
3.2.00
14
CUP
CRP
RP
UP
Alloc Request
RP
UP
{user, resource}
RP
UP
CP{user, resource}
RP
RP
3.2.00
p1
CP
p2
Discussion: same
credential
p3
15
16
3.2.00
17
Implementation
Globus Security Infrastructure (GSI)
All security algorithms coded in GSS
Standard API for obtaining credentials (only
passwords and certificates)
Deployed in GUSTO
Limited experience report
3.2.00
18
Lingering Concerns
Authentication only == no privacy
Requires knowledge of grid resources?
Global -> local mapping
User proxy contains set of target hosts
3.2.00
19