Sunteți pe pagina 1din 15

A Technical paper presentation on

SECURITY IN GRID COMPUTING

V.R.SIDDHARTHA ENGINEERING COLLEGE.


VIJAYAWADA-07
PRESENTED BY:

P.SUDHEER,

Y07IT105, II/IVB.Tech,

E-mail:prattipati8@yahoo.co.in

Ph no:9989153955

TO
Quest 09
JNTUCE,HYDERABAD
ABSTRACT:

A Computational Grid is a collection of an assurance that ad hoc related principals


heterogeneous computers and resources (users, platforms or instruments) forming a
spread across multiple administrative grid virtual alorganisation (VO) must each
domains with the intent of providing users act in conformity with the rules for the VO
uniformaccess to these resources. There are constitution. Trusted Computing (TC)
many ways to access the resources of a technology can add to grid computingthe
Computational Grid, each with unique needed property of behaviour conformity.
security requirements and implications for With TC using an essentially in-platform
both the resource user and the resource (trusted) third party, a principal can be
provider. Grid Computing strives to provide imposed to have conformed behaviour and
seamless, scalable access to wide-area this fact can be reportedto interested parties
distributed who may only need to be ad hoc related to
theformer. A broader goal of these scenarios
resources. However, with this benefit of
are to increase the awareness of security
resource collection and distribution, security
issues in grid computing
of that information becomes a major risk
(Vijayan, 2004). Currently there is debate
among IT professionals as to the security, KEY WORDS: VIRTUAL
functionality, middleware, and scalability ORGANIZATION(VO),TRANSMISSION
provisions of CONTROL PROTOCAL(TCP),OPEN
GRID SERVICE
computational grids. A central security ARCHITECTURE(OGSA),

requirement for grid computing can be


referred to as behaviour conformity. This is
CONTENTS:

 ABSTRACT

 INTRODUCTION

 WHAT IS A GRID COMPUTING?

 WHAT GRID COMPUTING CAN DO?

 CONCEPTS AND COMPONENTS OF GRID


COMPUTING

 CONSTRUCTION OF GRID COMPUTING?

 MIDDLEWARE

 VIRTUAL ORGANISATION

 WHAT GRID COMPTING CANNOT DO?

 SECURITY IN GRID COMPUTING

 FUNDAMENTALS IN GRID
SECURITY

 SYMMENTIC AND ANTI


SYMMENTIC KEY

 CERTIFICATE AND DIGITAL

 GRID SECURITY POLICIES AND


PROCDURE

 GRID SECURITY INFRASTRUCTURE

 PHYSICAL

 GRIDFRIEWALL

 OPERATING
SYSTEM

 HOST INTRUSION
DECTION
 POTENTIAL GRID SECURITY RISKS

 P

 APPLICATIONS AND LIMITATIONS OF GRID


COMPUTING.

 PRESENT AND NEXT GENERATIONS OF GRID


COMPUTING

 CONCLUSION

 REFERENCE
INTRODUCTION:Security requirements risk. To properly secure your grid
are fundamental to the grid design. The environment, there are many different tools
basic security components within the Globus and technologies available. This chapter will
Toolkit provide the mechanisms for examine some of those technologies and the
authentication,authorization, and different components provided within the
confidentiality of communication between Grid Security Infrastructure (GSI) of the
grid computers.Without this functionality, Globus Toolkit.
the integrity and confidentiality of the
WHAT IS A GRID COMPUTING?
dataocessed within the grid would be at

Grid computing, most simply stated, is communications between heterogeneous


distributed computing taken to the next system created the Internet explosion. The
evolutionary level. The goal is to create the emerging standardization for sharing
illusion of a simple yet large and powerful resources, along with the availability of
self managing virtual computer out of a higher bandwidth, are driving a possibly
large collection of connected heterogeneous Lequally large evolutionary step in grid
systems sharing various combinations of computing.
resources.The standardization of
WHAT CAN GRID COMPUTING DO?

When you deploy a grid, it will be to meet a


set of customer requirements. To better
match grid computing capabilities to those
requirements, it is useful to keep in mind the
reasons for using grid computing.

PARALLEL CPU:

The potential for massive parallel CPU


capacity is one of the most attractive
features of a grid. In addition to pure
scientific needs, such computing power A grid is a collection of machines,
isdriving a new evolution in industries such sometimes referred to as “nodes,”
as the bio-medical field, financialmodeling, “resources,” “members,” “donors,”
oil exploration, motion picture animation, “clients,” “hosts,” “engines,” and many
and many others. other such terms.They all contribute any
combination of resources to the grid as a
CONCEPTS AND COMPONENTS OF whole. Someresources may be used by all
GRID COMPUTING: users of the grid while others may have
CONCEPTS: Types of resources specificrestrictions.

add additional hardware to augment the


capabilities of the grid.
COMPONENTS:
ORGANIZATION: The technology
Any grid system has some management considerations are important in deploying a
components. First, there is a component that grid. However,organizational and business
keeps track of the resources available to the issues can be equally important. It is
grid and whichusers are members of the important to understand how the
grid. This information is used primarily to departments in an organization interact,
decide where grid jobs should be operate, and contribute to the whole.
assigned.Second, there are measurement
com ponents that determine both the SECURITY: Security is a much more
capacities of the nodes on the grid and their important factor in planning and maintaining
current utilization rate at any given time. a grid than
This information is used to schedule jobs in
the grid. Such information is also used to in conventional distributed computing,
determine the health of the grid, alerting where data sharing comprises the bulk ofthe
personnel to problems such as activity. In a grid, the member machines are
outages,congestion, or overcommitment. configured to execute programs rather than
This information is also used to determine just move data. This makes an unsecured
grid potentially fertile ground for viruses
CONSTRUCTION: and Trojan horse programs

DEPLOYMENT PLANNING: The use of a MIDDLEWARE:


grid is often born from a need for increased
resources of some type.One often looks to DEVELOPMENT:This discribes the
their neighbor who may have excess software for the grid portal environment
capacity in the particular resource. One of .source code and applications for two of the
the first considerations is the hardware main gro=id protocals.resource and
available and how it is connected via a LAN datamanagement.the software ws written by
or WAN. Next, an organization may want to apache jetspeed and IBMwebspherebportal
sphere.
SCHEDULER:schedulers are at the OGSA:Open grid service architecture is the
foundation of thee ny grid system.their job is middle-tier software that glues client and
to schedule programme or jobs in clusters of scheduler service together.this includes
of maachine among others.and it also overview of ogsa,service
includes sun grid engine,(Sge),condorand models,interfaces,factories,lifetime
others.and also includes managedd job management,service discovery,notifications
factory service providede by
troubleshootuing& globus toolkit.

VIRTUAL ORGANIZATION: Two or more bullet that can take any application and run
organizations that share resources become it a 1000 times faster withoutthe need for
VO.The policies governing access to those buying any more machines or software. Not
resource vary according to the actual every application issuitable or enabled for
organizations involved,creating an running on a grid. Some kinds of
environmemnt of providers and applications simplycannot be parallelized.
consumers.resources are made available by For others, it can take a large amount of
owners withconstraints on when,where and work to modifythem to achieve faster
what can be done on them.Resources throughput. The configuration of a grid can
consumers may also place constraints on greatly affect the performance, reliability,
properties of the resources they are prepared and security of an organization’s computing
to work with.For example ,a consumer may infrastructure. For all of these reasons, it is
important for the users to understand
accept resource over a secure channel only.
how far the grid has evolved today and
WHAT CAN GRID COMPUTING which features are coming tomorrow or in
CANNOT DO: the distant future.
A word of caution should be given to the
overly enthusiastic. The grid is not a silver
:SECURITY IN GRID COMPUTING: as to whether or not any requested access or

FUNDAMENTALS IN GRID SECURITY: operation is allowed within .


Security requires the three fundamental Authentication Authentication is the process
services: authentication, authorization,and of verifying the validity of a claimed
encryption. A grid resource must be individual and identifying who he or she
authenticated before any checks can be done is.Authentication is not limited to human
beings; services,
applications, and other entities may be SYMMENTIC: Symmetric key encryption
required to authenticate also.
is based on the use of one shared secret key
Access control Assurance that each user or
to perform both the encryption and
computer that uses the service is permitted
decryption of data. To ensure that the data is
to do what he or she asks for. The process of
only read by the two parties (sender and
authorization is often used as a synonym for
receiver), the key has to be distributed
access control, but it also includes granting
securely between the two parties and no
the access or rights to perform some actions
others. If someone should gain access to the
based on access rights.
secret key that is used to encrypt the data,
Data integrity Data integrity assures that the
data is not altered or destroyed in an they would be able to decrypt the
unauthorized manner.
information. This form of encryption is
Data confidentiality Sensitive information
much faster than asymmetricencryption
must not be revealed to parties that it was
not meant for. Data confidentiality is often
Here are some commonly used examples of
also referred to as privacy. a symmetric key cryptosystem:
Key management Key management deals
with the secure
generation,distribution,authentication, and
storage of keys used in cryptography.
SYMMENTIC AND ANTI
SYMMENTIC KEYS ENCRYPTION:
_
Data Encryption Standard (DES): 56-bit key ANTI SYMMENTIC KEY ENCRYPTION:
plus 8 parity bits, developed by
IBM in the middle 1970s The asymmetric key pair is generated by a
_ Triple-DES: 112-bit key plus 16 parity bits computation which starts by finding two
or 168-bit key plus 24 parity bits vary large prime numbers. Even though the
(that is, two to three DES keys) public key is widely distributed, it is
_ RC2 and RC4: Variable-sized key, often practically impossible for computers to
40 to 128 bits long
To summarize, secret key cryptography is calculate the private key from the public
fast for both the encryption and decryption key. The security is derived from the fact
processe . However, secure distribution and that it is very difficult to factor numbers
management of keys is difficult to exceeding hundreds of digits.This
guarantee. mathematical algorithm improves security,
but requires a long encryption time,
especially for large amounts of data. For this key between the two parties,and all further
reason, public key encryption is used to encryption is performed using this
securely transmit a symmetric encryption symmetric key.

Figure 3-1 Symmetric key encryption using a


shared secret key

CERTIFICATE AND DIGITAL _ Protecting the Certificate Authority server


AUTHORITIES: _ Maintaining a namespace of unique names
for certificate owners
CERTIFICATE:A properly implemented _ Serve signed certificates to those needing
Certificate Authority (CA) has many to authenticate entities
responsibilities. responsibilities.These _ Logging activity
DIGITAL:
should be followed diligently to achieve
good security. The primary Digital certificates are digital documents
responsibilities are: that associate a grid resource with its
_ Positively identify entities requesting specific public key. A certificate is a data
certificates
_ Issuing, removing, and archiving structure containing a public key and
certificates
pertinent details about the key owner. A
certificate is considered to be a tamper-proof
electronic ID when it signed by the
Certification Authority for the grid
environment. Digital certificates, also called
X.509 certificates, act very much like
passports;they provide a means of
identifying grid resources. Unlike passports,
digital certificates are used to identify grid
resources.

GRID SECURITY POLOCIES AND build a CA, but unfortunately none of the
PROCEDURE: policies. In this section, we will examine
CA AUTHORITY some of the basic policies and expectations
A PKI must be operated in accordance with
that a CA would normally be responsible
defined policies. The deployment of a PKI
for. For any type of 76 Introduction to Grid
system in an organization requires the
Computing with Globus production CA
development of security policies and
duties, it is suggested that you examine a
processes for that organization. The demo
commercial vendor To providetheseservices
CA that is provided within the Globus
for you
Toolkit provides the software in order to
.
CONTROL REVIEW: affect the overall security of the
When building any new environment or
environment and any other areas of change.
mplementing a new software application, it
This can help provide guidance on the
is always a good idea to perform a security
overall use of security controls or how you
health check. A security health check will
are managing security within your
help determine how these new changes will
environment. A review of your security
controls can help you better understand how will provide an in-depth review of the site
security works for your passwords, security controls in place and the related
administration, toolsets, auditing, and processes used within the organization.
monitoring within your environment. This

GRID SECURITY INFRASTRUCTURE: require additional security. In a grid

Apart from the different GSI components environment,this is no different. The use of

and technologies, there are many other firewalls within a grid design helps restrict

infrastructure security components that are network.access to computers. The firewall is

needed to secure the grid. an important piece of the

Physical security securityinfrastructure, so it needs to be


Once again, the security of grid carefully analyzed and understood before it
infrastructure is based on other common is implemented.
security fundamentals. The basics involve
solid physical security practices for all grid OPERATING SYSTEM:
computers. The physical environment of a
A review of the configuration files for each
system is also considered a part of
operating system and middleware
theinfrastructure. physical access should be
component within the scope of the project
controlled and ispart of the security policies
determines how each effectively allows
that need to be defined For maximum
authorized users access based on your
security, the network segment where the
security policy and prevents and detects
PKI-sensitive servermachines are installed
unauthorized access attempts at all times.
should be physically and logically separated
You should:
from the rest of the network. Ideally, the
_ Remove any unnecessary processes from
separation is done through a firewall that Is the servers. If the grid server does not need
transparent only for PKI-related traffic. sendmail or an FTP server running, these
processes should be disabled.
Normally, PKI traffic is reduced to using _ Remove any unnecessary users or groups.
only a few TCP/IP ports. Introduction to Grid Computing with Globus
_ Use strong passwords for all users on the
grid server.
GRID FIREWALLSFirewalls can be used _ Update your server with the latest updates
within networked environment to logically and security FixPacks. This includes all
software the has been installed as well.
separate different sets of computers that
_ Restrict access to the /.globus directory. any software application that stores
_ Consider using host IDS to monitor
important files within the local workstation,
important directories on the server.
_ Enable logging and auditing for the server. host intrusion detection can add a greater
_ Use a uniform operating system build
defense for anyone manipulating files on the
whenever possible.
_ Enable file level restrictions on important workstation thatshould not be doing so.
files within the server.
Intrusion detection functions include:
_ Make periodic reviews of the operating
_ Monitoring and analyzing both user and
system every other month to ensure
that nothing major has changed. system activities
_ Enable anti-virus protection.
_ Analyzing system configurations and
HOST INTRUSION DETECION:
vulnerabilities
A recommended option for further securing _ Assessing system and file integrity
_ Ability to recognize typical patterns of
your grid computers is to invest in a host attacks
intrusion detection (IDS) product. As with _ Analysis of abnormal activity patterns
_ Tracking user policy violations
and understand that with any networked
POTENTIAL GRID SECURITY RISK:
environment there is going to be some risk
potential: involved.

Building a PKI environment will provide the Impersonation: Obtaining a certificate


necessary services along with the GSI to through fraudulent means (either user or
design a secure grid solution. This, however, organization).

does not guarantee that there are not any Theft of private key: Unauthorized use of a
security risks. Within this section, we will private key associated with a
validcertificate.
examine somen possible vulnerabilities to
watch out for during your security design. Compromise of root CA private key: Using
a CA key to sign fraudulentcertificates or
This is by no means a laundry list for all
destroying a private key.
security vulnerabilities or a cookbook for
Automatic Trust Decisions: Automated
building a srcure infrastructure.
trust decisions can also automate fraud.
PKI vulnerabilitiesJust because you have Grid server vulnerabilities
built a PKI environment does not mean that
Any server or workstation that participates
your networkis completely secure. There are
in the grid is a potential vulnerability to an
still many vulnerabilities to be aware of. It
external or internal hacker. Knowing this, it
isnecessary to always keep an open mind
is very important to protect and isolate any
grid computer from any network or Any modification of the gridmap file.
resources that do not need explicit access to Latest operating system FixPacks. Any
the grid. Good physical security will limit application FixPacks.
the exposure of anybody walking up to the
server and accessing the console. APPLICATIONS AND LIMITATIONS
OF GRID COMPUTING:
Protect any directories of the /.globus
directory. Distributed data management
• Compute resources for simulations
Theft of the digital certificate and private
• Coupling distributed data with simulation
key (along with the private key Virtual resources and virtual organizations
for collaboration:
phrase).

Any application vulnerabilities or processes Reliability:


that are running on the grid
High-end conventional computing
systems use expensive hardware to increase

reliability.
VIRTUAL ORGANIZATION THROUGH GEOGRAPHICALLY.

PRESENT AND FUTURE provide guidance for theGrid user, the Grid
GENERATION OF GRIDS: application developer, and the Grid resource
Today, grid systems are still at the early provider. While a given scenario can
stages of providing a reliable, well provide practical guidance for design and
performing, and automatically recoverable deployment, additional insightis gained by
virtual data sharing and storage. We will see recognizing the general, rapidly-emerging
products that take on this task in a grid issuessuch as the need for restricted
setting, federating data of all kinds, and delegation (giving onlysubset of your rights
achieving better performance, integration to something that will act on yourbehalf)
with scheduling, reliability, and capacity. that can be seen running through many of
Autonomic computing has the goal to make the scenarios.
the administrator’s job easier by automating
the various complicated tasks involved in
managing a grid. These include identifying
problems in real time and quickly initiating
corrective actions before they seriously
impair the grid.

CONCLUSION: There are many subtle security implications


involved in the many emerging Grid usage
Computational Grids are rapidly emerging
scenarios. Both the resource provider and
as a practical means by which to perform
the resource consumer should under stand,
new science and new applications.
from a security perspective, what is
The goal of this paper was not to discuss the
expected from each other and what might
particularsecurity mechanisms or policies of
happen if these expectations are not met.
systems such as Legion,Globus, or any other
Without this understanding, the transition
existing system, but rather to describeGrid
from experimental systems into production
security that transcends existing approaches.
systems will soon be curtailed by explicit
Each scenarioin this paper is designed to
security violations or more subtly a
compromise of information that a user had
believed was securely kept private.

REFERENCES:

TEXTBOOKS:

GRID COMPUTING A Research


Monograph by D JANAKIRAM

GRID COMPUTING for DEVELOPERS


by VLADIMIR SILVA

Introduction to GRID COMPUING with


globus

By IBM.com/redbooks

WEBSITES:

AN INTERNATIONAL WORK SHOP


PAPER ON Security Implications of
Typical Grid Computing Usage Scenarios
by Marty Humphrey, Mary R. Thompson
http://www.wikipedia.com/
www.amazon.com
www.grid.org
www.ibm.com/redbooks

S-ar putea să vă placă și