Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
…
4 pages
1 file
Grid computing is an environment where sharing of geographically distributed resources helps in performing the computation that cannot be achieved due to limitation like not having the proper amount of storage or the computation power required by a system to execute the job. One of the important point for grid computing devices are there low power usages and no central control point which enables users to access the small devices irrespective of their geographical position with different management policies. Security is the most important concern in Grid computing environment. In this paper an attempt has been made to understand the working of gird environment and what are the necessary points need to take by an organization in terms of security design for grid computing.
Grid computing provides high computing power, enormous data storage, and collaboration possibilities to its users. A Computational Grid is a collection of heterogeneous computers and resources spread across multiple administrative domains with the intent of providing users uniform access to these resources. There are many ways to access the resources of a Computational Grid, each with unique security requirements and implications for both the resource user and the resource provider. A comprehensive set of Grid usage scenarios are presented and analyzed with regard to security requirements such as authentic cation , authorization, integrity, and confidentiality. The main value of these scenarios and the associated security discussions are to provide a library of situations against which an application designer can match, thereby facilitating security-aware application use and development from the initial stages of the application design and invocation. A broader goal of these scenarios are to increase the awareness of security issues in Grid Computing. In the networked access to computation with a single-sign-on system as the portal to the possibilities of world wide computing grids security plays an important role.
Grid computing provides high computing power, enormous data storage, and collaboration possibilities to its users. A Computational Grid is a collection of heterogeneous computers and resources spread across multiple administrative domains with the intent of providing users uniform access to these resources. There are many ways to access the resources of a Computational Grid, each with unique security requirements and implications for both the resource user and the resource provider. A comprehensive set of Grid usage scenarios are presented and analyzed with regard to security requirements such as authentic cation , authorization, integrity, and confidentiality. The main value of these scenarios and the associated security discussions are to provide a library of situations against which an application designer can match, thereby facilitating security-aware application use and development from the initial stages of the application design and invocation. A broader goal of these scenarios are to increase the awareness of security issues in Grid Computing. In the networked access to computation with a single-sign-on system as the portal to the possibilities of world wide computing grids security plays an important role. Keywords: Grid Computing, Security, Intrusion detection system etc
Unlike other computer systems, the grid computation stands for systematically interrelated heterogeneous computers and computing resources under a multiple management and administrative domains. Such varyingly varying computational resources in the name of grid computing only aim at providing the users easy access to the resources. One can utilize number of ways to get access to those resources and developers can utilize different architecture to build the grids. While the constructional architecture of these grid computers are by large different in terms of their implications, objectivity and usage; researchers found grid computing security to be a major field to study and experiment. Contemporary research efforts should that the objectivity variance and implicational architectural variation among different grid computing architecture are right to be perceived as the key reason of security concerns. More explorative study of these architectures and further research on grid computing security revealed that researchers can in many instances overcome the architectural differences in security variations but they cannot completely ensure protection. This paper studies Legion, Globus, CRISIS architecture of grid computing to explore what else is impacting the grid computing security performance. Is it users usage of the grid computing that is causing security vulnerability of the system? What aspects of users usage of grid computing are actually impacting the grid computers security performance? Is there any way to overcome the situation? This paper systematically attempts to find all the answers.
Grid networks are today's more focusing area of research for the researchers due to the services it provides with its cost effectiveness in the most advanced technologies in an innovative use. Even though it is providing various level of services, still it is facing a very big challenges, due to the security concerns, that may arise in a collaborative environment for creating a level of trust among the organization that will be part of the grid. This paper will review the literature of the work done in past and currently for tackling the security concerns and will lay a foundation for making the security and privacy more tighten in such a large collaborative environment that can grow to a very large scale. This work will mainly focus on the current trends in grid network for coping with the security and privacy issues.
The purpose for this paper was to come out with a theoretical framework to standardize the solutions to the existing security challenges in Grid computing. The principal objectives were to contribute to ongoing research to help improve its security measures.
2011
This paper provides a survey of Security in the computational grid environment. A computational grid is collection of heterogeneous computers and resources spread across multiple administrative domains with the intent of providing users easy access to the resources. There may be many way to access the resources of computational grid, each with security requirements for both resource user and resource provider. There are many security issues in the Grid Computing Environment mentioned in [4]. So the main goal of this paper is to provide the information about security, security issues in the grid computing environment and also analyzes security problems existing in Grid Computing System and describes the security mechanism in Grid Computing System
This paper portrays security advancements and components utilized as part of Grid computing environment. The Grid Security Infrastructure (GSI) executed in the Globus Toolkit also, is portrayed in detail. The principle concentrate is on strategies for distinguishing proof, verification and approval, in view of X.509 endorsements and SSL/TLS conventions. At long last an answer of group based get to control over the network assets is displayed, which is make over on the usage of the Globus Toolkit.
The purpose of this project was to come out with a theoretical framework to standardize the solutions to the existing security challenges. The principal objectives were to contribute to the ongoing research to help improve the security measures on grid computing. Hypervisor security model, Host/Platform security model, Security Communication model and Security between Guests were developed and implemented. The major finding derived from this study suggests that Grid Computing Security can have challenges in the following areas: Authentication and Authorization of users, integration to other exiting systems and enforcing trust policies within dynamic Grid environment. Based on the above mentioned challenges with Grid Computing Security a proposed conceptual model has been designed to solve these issues. The various models were implemented and tested to evaluate their performance.
Studia Ethnologica Tomus XXI-XXII, 2014
John A. Grossman., 2022
Nutricion hospitalaria, 2014
Acta Crystallographica Section A Foundations of Crystallography, 2011
Veterinary Sciences, 2022
Acta Oncologica, 1989
Japanese Journal of Ophthalmology, 1997
Neurocritical care, 2018
Journal of Fluorine Chemistry, 1990
Food Technology and Biotechnology, 2021