International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 2, April 2014
CROSS-DOMAIN IDENTITY TRUST MANAGEMENT
FOR GRID COMPUTING
Amr Farouk, Mohamed M. Fouad and Ahmed A. Abdelhafez
Department of Computer Engineering, Military Technical College, Cairo, Egypt
ABSTRACT
The grid computing coordinates resource sharing between different administrative domains in large scale,
dynamic, and heterogeneous environment. Efficient and secure certificateless public key cryptography (CLPKC) based authentication protocol for multi-domain grid environment is widely acknowledged as a
challenging issue. Trust relationships management across domains is the main objective of authentication
protocols in real grid computing environments. In this paper, we discuss the grid pairing-free certificateless two-party authenticated key agreement (GPC-AKA) protocol. Then, we provide a cross domain trust
model for GPC-AKA protocol in grid computing environment. Moreover, we analysis the GPC-AKA
protocol in multiple trust domains simulated environment using GridSim toolkit.
KEYWORDS
Certificate-less authenticated key agreement, cross-domain identity trust, grid computing.
1. INTRODUCTION
For fully secure and efficient grid entities authentication, it is required to build a provable secure
authenticated key agreement (AKA) protocol. Moreover, it should meet with the requirements of
large scale distributed, heterogeneous and dynamic grid virtual organizations (VO), that usually
spans multiple trust domains [1]. Hence, trust in grid computing is the firm belief between grid
entities to enable grid systems to work normally in the context of the fundamental grid functions
[2]. Trust relationship in grid computing environments is classified based on trust domain
boundaries into three categories [3]: i) intra-domain trust refers to the trust relationship between
members and the power institutions of the domain. ii) interdomain recommendation trust is a kind
of trust relationship which is set up by the power institutions in the grid levels. iii) cross-domain
trust means the trust relationship among members of different domains. As well, based on trust
approaches, trust relationship is classified into the following categories [2]: i) identity trust (i.e.,
objective trust) is associated with verifying the authenticity of an entity and focuses on the
objective credentials. ii) behavioral trust (i.e., subjective trust) deals with a wider notion of an
entity’s “trustworthiness”, which depends on certain contexts. The relationship can take many
directions. First, in resource allocation process, the resource provider want to know the trust level
(i.e., acceptable code and not harmful) of the grid user requested job. Second, the resource
provider guarantees to the grid user, the process execution without interruption and the user's
privacy protection [2].
Grid computing as a VO for resources collaboration and coordination, has become so prevalent
that grid trust relationship become an intensive topic. In the trust research area, the numerous
literatures proposed the different trust models. These have provided the valuable thoughts for
DOI : 10.5121/ijsptm.2014.3202
11
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 2, April 2014
trust research in the grid environment. As different management domains take different security
policies to mange intra-domain security in the grid, it’s difficult to form an overall management
strategy among different domains [3]. In order to build trust relations between entities and
different trust domains, we give the ring framework of objective trust model. Ring topology has
no root KGC, so no single point of trust. This approach construct a global trust infrastructure
composed of group of trust authorities (i.e., KGCs) without the hierarchy level limitation, so it
has a scalability advantage. A objective trust modeling method suitable in grid environment is
proposed based on the characteristics of grid computing and the features of objective trust.
This paper addresses trust management issues in grid computing and analyses some relevant
cross-domain scenarios. Then it derives main requirements in terms of cross authentication. We
discuss the efficient GPC-AKA protocol based on GDH complexity problem. As well, we
propose a cross-domain grid trust model based on GPC-AKA protocol. In addition, we design and
implement a simulation of the proposed grid trust model based on a world wide grid testbed. The
testbed is composed of multiple organizations, each have its own KGC, and concerned to build a
trust relationships with the others. Furthermore, we analyses the performance of cross-domain
GPC-AKA protocol in complex simulated scenarios.
The rest of this paper is organized as follows. Trust in grid computing is described in Section II.
The grid pairing-free CLAKA protocol is presented in Section III. Section IV shows the proposed
Grid trust management model based on GPC-AKA protocol. Simulation experiment of crossdomain GPC-AKA using GridSim is introduced in Section V. Finally, Section VII provides our
research conclusions.
2. TRUST IN GRID COMPUTING
Recently, trust has been recognized as an important factor for grid computing security. Several
interesting trust models have been proposed for integration into the Grid computing systems [4]–
[7]. However, we have found that theses trust models specialize in applying trust for enhancement
of resource allocation functions of a grid system; also the trust mechanisms are mainly based on
behavioral methods, which is not scalable nor efficient.
A grid computing environment is a virtual organization (VO) that is composed of several
autonomous domains in which different security policies are applied. The grid computing
environment features are [8]: The user population and resource pool (e.g., quantity, location) are
large and dynamic. A computation is composed of a dynamic group of processes (i.e., created and
destroyed dynamically during program execution) running on different resources and sites. The
pre-trust relationships establishment between different grid sites is impractical due to the dynamic
nature of the grid computing environment [8].
The trust management is a distinct and crucial component of grid services security. Aspects of
the trust management problem include formulating security policies and security credentials,
determining whether particular sets of credentials satisfy the relevant policies, and deferring trust
to third parties.
First, security policy, is a set of rules that define the grid users (i.e., security subjects), grid
resources (i.e., security objects) and relationships among them [8]. Resources may require
different local policies (e.g., authentication and authorization mechanisms), that apply at the
different sites, which we will have limited ability to change. Authentication is the first line of
defence in the grid security policy that provides mapping from local security policies into a global
framework [8].
12
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 2, April 2014
Second, security credential can be defined as a piece of information that is used to prove the
identity of a subject [8]. Federation of identities when grid entities have different identities and/
or credentials in different security domains. Identity federation is a set of organizations that
establish trust relationships with respect to the federated identity information. Identity federation
technology (e.g., Shibboleth) enables that no need for direct trust relationship between users and
accessed domains. However, the identity server store the individual credentials securely, the main
challenge is to protect the user's privacy.
Third, trust domain can be defined as a logical, administrative structure that holds a single,
consistent local security policy [8]. In this study, we will focus on the third point which is grid
trust relationships using grid authentication protocol.
We can solve grid trust management problems using grid authentication protocols based on
identity that distinguishes a distinct user, process or resource within the context of a specific
namespace. Identity Authentication: proving as association between an entity and an identifier.
Attribute Authentication: proving as association between an entity and an attribute.
We will use the proposed GPC-AKA protocol based on the general grid security architecture of
Foster et. al. [8]. Our approach to trust management is based on the following general principles:
unified mechanism, flexibility, locality of control and separation of mechanism from policy.
3. EFFICIENT AND SECURE GRID PAIRING-FREE CL-AKA
Wang et. al. [9] present the first grid certificate-less authentication based on certificate-less public
key cryptography (CL-PKC), that is a kind of cryptography between certificate based and
identity-based PKC. The bilinear pairing is then considered as an expensive cryptography
primitive. Therefore, a number of pairing-free CL-AKA protocols, have been proposed to
improve efficiency. These protocols, either have a security issues or are not efficient to be
practical implemented in real environments.
We focus on the more recent efficient pairing-free CL-AKA protocol, as formal prove the
protocol security to be suitable for practical grids. Recently, Amr et. al. [10] proposed an efficient
and provable secure grid pairing-free certificate-less two-party authenticated key agreement
(GPC-AKA) protocol. The GPC-AKA protocol uses a user proxy (UP) and resource proxy (RP)
to support the grid single sign on (SSO) and frequent mutual authentication requests [8].
GPC-AKA protocol requires 3 elliptic curve point multiplications, 5 elliptic curve point additions,
2 hashing functions, and 2 message exchanges. The proposed Pairing-free certificate-less two
party authenticated key agreement for grid (GPC-AKA) is introduced into two phases, as
illustrated in Fig. 1 and Fig. 2, respectively.
13
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 2, April 2014
Figure 1. Proposed GPC-AKA key generation setup scheme (Phase 1).
Figure 2. Proposed key agreement scheme GPC-AKA (Phase 2).
4. CROSS-DOMAIN GRID TRUST MANAGEMENT
Grid computing environments include different resources through cross-organizational
boundaries on a large scale basis. This heterogeneous environment consists of multiple
disconnected trust domains, applying its own policies and mechanisms for authentication.
Consequently, an important challenge for the GPC-AKA is to provide a cross-domain
authentication service. It should be pointed out that existing identity trust models suffer from a
14
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 2, April 2014
restricted and static vision of trust (i.e., strict hierarchies where trust flows from the root to the
leaves).
We propose a novel trust model reflecting the required dynamic nature of trust for grid entities,
through cross organizational boundaries, with little administrative overhead. Based on crossdomain grid computing GPC-AKA authentication protocol, a Grid Trust Management (GTM)
model has been designed to establish trust relations between grid entities. Cross-domain GPCAKA trust model is shown in Fig. 3.
Figure 3. Grid Trust Model.
We adopt some common approaches for scalability and flexibility in our design. To our
knowledge, the following discussion represents the first such grid trust management model that
has been defined to this level of detail. Our proposed GTM design model answers the following
questions:
1) How to add new KGC? According to the grid virtual organization concept, we can add a new
KGC to the virtual organization KGCs group in ring topology avoiding the hierarchal problems,
by sharing the same system parameters. Since, in the real grid, most trust domains are
autonomous, using different system parameters. So in our GTM model, all the system parameters
of PKG are the same, except the system public key and master key.
2) How to do key revocation? key expiration in GTM is straightforward, used for key revocation.
Short-term key revocation using fine-grained identifier (e.g., extend the user’s identifier to
include another field that specifies a validation period). The validation period inversely
proportional to the KGC server load.
3) How to do key renew? In a grid environment, it is normal practice to renew the user’s longterm keys on a monthly or yearly basis. This can be done through the KGC issuing a new private
key directly to the user through a secure channel. Short-term keys are used for various security
service such as mutual authentication, single sign-on and delegation.
4) How to build trust between KGCs? Trust relationships between KGCs can be established as
follows, system parameters of the KGCs are then assumed to be trusted by all users and
recognized by the grid system, as shown in Table I.
5) How to build cross-domain trust between entities? Cross-domain GPC-AKA protocol
consistency is proved as follow.
15
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 2, April 2014
Table 1. Cross-Domain GPC-AKA.
Parameters
Public
Secret
D1
U1
Pu 1
Xu1, tu1
D2
KGC1
KGC2
P01,Params P02,Params
S1, Du1
S2, Dr2
R2
Pr2
Xr2, tr2
Where Params = {Fp,E/Fp,G, g,H1,H2} are the same in both KGCs (i.e., KGC1,KGC2) and grid
entities (i.e., U1,R2).
Cross-domain GPC-AKA protocol consistency is proved:
KU1R2 = (tU1 + DU1 + x U1)(TR2 + PR2 + RR2 + H1(ID R2,R R2, P R2)P0)
= (tU1 + DU1 + xU1)((t R2.P) + (x R2.P) + (r R2.P) + (Q R2.sP))
= (tU1 + DU1 + xU1)(t R2 + x R2 + r R2 + Q R2.s)P
= (tU1 + DU1 + xU1)(t R2 + x R2 + D R2)P = K R2U1
where IDR2= IDKGC2||IDR2.
5. CROSS-DOMAIN GPC-AKA SIMULATION EXPERIMENT
In this section, we present the simulation experiment of cross-domain GPC-AKA protocol in grid
computing environment. Grid network topology is explained in Section V-A. Furthermore, a
GPC-AKA simulation using GridSim toolkit is provided in Section V-B.
The only feasible way to analyze repeatable experiments and studies that are not possible in real
dynamic grid environment is the using of grid simulator. We choose the Java-based simulation
platform GridSim Toolkit [11] with network extension package to simulate the message exchange
of the proposed multiple trust domains GPC-AKA protocol. As well, GridSim is based on
SimJava which is a discrete event simulation tool based on Java and simulates various entities by
multiple thread. This aligns well with randomness of grid computing entity action.
5.1. Grid Network Topology
In this section, we provide a scenario of the cross-domain authentication using GPC-AKA
protocol. We have created an experiment based on the World Wide Grid testbed [12], as shown in
Fig. 4.
16
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 2, April 2014
Figure 4. Cross-Domain Grid Network Topology.
A Grid resource contains one or more Machines. Similarly, a machine contains one or more
processing elements (PEs) or CPUs. For this experiment, we are simulating five VO domains and
each resource belongs to one of them, with three Machines that contains one or more PEs. The
VO mapping is done by taking into account a geographical dissemination among the resources.
Table II summarizes the characteristics of simulated resources, which were obtained from a real
World Wide Grid testbed.
Table 2. Grid Topology and Resources Characteristics.
Domain
Resource
Name
N1
UltraAX-i2, SunOS, Sparc
D2
N2
Sun HPC 3500, GridEngine, Solaris,
Sparc
N3
D4
N4
D5
N5
Time
Zone
grid1.fmridc.org, USA, Hanover
16
-4
sunresearch.qub.ac.uk, UK, Belfast
6
+1
40
+1
20
+2
4
+11
Host name & Location
D1
D3
No.
CPU
Resource Characteristics
SGI Origin 3800, IRIX 6.5.17m, Irix,
calvin.nuigalway.ie, Ireland,
MIPS
Galway
SGI Onyx 3000, IRIX64, Irix, MIPS
onyx3.zib.de, Germany, Berlin
IBM eServer, Linux, IA-32
belle.physics.usyd.edu.au, Australia,
Sydney
17
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 2, April 2014
We created five scenarios, each time we increased the total grid users {5,10,15,20,25} to simulate
the concurrent requests and uniformly distributed them among the five trust domains, each
domain has {1,2,3,4,5} user(s). In our simulation setup, some parameters are set identical for all
network elements, such as the maximum transfer unit (MTU) of links is set to 1,500 bytes and the
latency is set to 10 milliseconds. We can conclude the simulation experiment parameters in Table
III.
Table 3. Simulation Parameters.
Parameter
Value
number of grid users
number of grid resource
number of gridlets
baud rate
propagation delay
max. transmission unit (MTU)
{5,10,15,20,25}
5
1
1000 bits/sec
10 msec
1500 byte
5.2. Simulation using GridSim Toolkit
Object-oriented GridSim toolkit allows modeling of heterogeneous types of resources, located in
any time zone. As well, multiple user can simultaneously submit tasks for execution in the same
resource, that may be timeshared or space-shared. In addition, statistics of operations can be
recorded and they can be analyzed using GridSim statistics analysis methods.
GridSim Toolkit V5.2 is run, on a 2 GHz Intel core 2 duo with 6 GB RAM. This simulation
scenario shows how to create user and resource entities connected via a network topology, using
link and router. In addition, background traffic functionality is explained in this scenario. Fig. 5
shows GPC-AKA simulation steps using GridSim.
Figure 5. Main GPC-AKA Simulation Steps using GridSim.
Independent tasks are heterogeneous in terms of processing time and input files size. In GridSim,
such tasks can be created and their requirements can be defined through gridlet objects [13]. We
simulate GPC-AKA message exchange using the gridlet concept in GridSim. One gridlet for
mutual GPC-AKA instance for each pair of grid entities.
18
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 2, April 2014
6. DISCUSSION AND ANALYSIS
In the first experiment, we simulate the cross-domain GPCAKA message exchange without
background traffic, as shown in Fig. 6. We simulate 5 trust domains and increase the number of
users per each domain {1,2,3,4,5} who send concurrent requests to check GPC-AKA scalability
and get the minimum, maximum, and the average of the response time. For 1 user per domain,
with 5 total grid users, the minimum response time 126.30 seconds, maximum response time
140.52 seconds, and average response time 136.72 seconds. For 2 users per domain, with 10 total
grid users, the minimum response time 169.30 seconds, maximum response time 214.14 seconds,
and average response time 191.96 seconds with 71% increased. For 3 users per domain, with 15
total grid users, the minimum response time 197.30 seconds, maximum response time 290.15
seconds, and average response time 246.20 seconds with 78% increased. For 4 users per domain,
with 20 total grid users, the minimum response time 233.30 seconds, maximum response time
366.13 seconds, and average response time 301.94 seconds with82% increased. For 5 users per
domain, with 25 total grid users. the minimum response time 269.30 seconds, maximum response
time 440.92 seconds, and average response time 357.54 seconds with 84% increased.
Figure 6. Concurrent Requests versus Time without Background Traffic.
In the real grid environment there is a background traffic. So, the second experiment, simulates
the GPC-AKA message exchange with background traffic, as shown in Fig. 7. For 1 user per
domain, with 5 total grid users, the minimum response time 139.64 seconds, maximum response
time 172.02 seconds, and average response time 151.14 seconds. For 2 users per domain, with 10
total grid users, the minimum response time 172.92 seconds, maximum response time 229.65
seconds, and average response time 202.42 seconds with 75% increased. For 3 users per domain,
with 15 total grid users, the minimum response time 211.63 seconds, maximum response time
352.02 seconds, and average response time 278.84 seconds with73% increased. For 4 users per
domain, with 20 total grid users, per minimum response time 233.30 seconds, maximum response
time 420.43 seconds, and average response time 321.41 seconds with 87% increased. For 5 users
per domain, with 25 total grid users, the minimum response time 269.30 seconds, maximum
response time 580.02 seconds, and average response time 417.20 seconds with 77% increased.
19
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 2, April 2014
Figure 7. Concurrent Requests versus Time without Background Traffic.
7. CONCLUSIONS
According to the trust relationships between different security domains, an authentication
protocol suitable for multiple security (i.e., trust) domains in grid computing is proposed in this
paper. We present an efficient and secure pairing-free two party certificate-less authenticated key
agreement protocol for grid computing (GPC-AKA) based on GHD complexity problem. Based
on GPC-AKA, a grid trust management (GTM) model is proposed. At last, the authentication
protocol is analyzed with simulated grid environment using GridSim. So, we can infer that GPCAKA is a cross-domain authentication protocol suitable for large scale and dynamic grid
computing environments.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
A. Farouk, A. A. Abdelhafez, and M. M. Fouad, “Authentication mechanisms in grid computing
environment: Comparative study,” in IEEE International Conferencce on Engineering and
Technology, Oct. 2012, pp. 1–6.
J. Luo, X. Ni, and J. Yong, “A trust degree based access control in grid environments,” Information
Sciences, vol. 179, no. 15, pp. 2618–2628, 2009.
H. Hai-sheng and W. Ru-chuan, “A new subjective trust model in grid computing,” in Computer
Application and System Modeling (ICCASM), 2010 International Conference on, vol. 9. IEEE, 2010,
pp. V9–360.
Z. Yongqiang, L. Qiang, and T. Haibo, “A hybrid system for authentication service,” in 5th
International Conference on Intelligent Networking and Collaborative Systems, 2013, pp. 821–826.
L. Guoyuan, B. Yuyu, and L. Min, “Trust based access control policy in multi-domain of cloud
computing,” Journal of Computers, vol. 8, no. 5, pp. 1357–1365, may 2013.
T. Liye and J. Wei, “A multi trust chain scheme in trusted crossdomain interaction,” in International
Conference on Industrial Control and Electronics Engineering, 2012, pp. 550–553.
Z. Shaomin, Z. Yue, and W. Baoyi, “A novel grid trust model based on fuzzy theory,” in Third
International Conference on Network and System Security, 2009, pp. 203–207.
I. Foster, C. Kesselman, G. Tsudik, and S. Tuecke, “A security architecture for computational grids,”
in Proceedings of the 5th ACM conference on Computer and communications security. ACM, 1998,
pp. 83–92.
W. Shengbao, C. Zhenfu, and B. Haiyong, “Efficient certificateless authentication and key agreement
(CL-AK) for grid computing,” in International Journal of Network Security, vol. 7, no. 3, Nov. 2008,
pp. 342–347.
20
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 2, April 2014
[10] A. Farouk, M. M. Fouad, and A. A. Abdelhafez, “Analysis and improvement of pairing-free
certificate-less two-party authenticated key agreement protocol for grid computing,” International
Journal of Security, Privacy and Trust Management (IJSPTM), vol. 3, no. 1, 2014.
[11] S. Anthony, P. Gokul, B. Rajkumar, and T. Chen-Khong, “Constructing a grid simulation with
differentiated network service using gridsim,” in IEEE, 2004.
[12] A. Barmouta, “Authorisation and accounting services for the world wide grid,” Master of Science,
School of Computer Science and Software Engineering, University of Western Australia, jun 2004.
[13] B. Rajkumar and M. Manzur, “Gridsim: a toolkit for the modeling and simulation of distributed
resource management and scheduling for grid computing,” in Concurrency and Computation:
Practice and Experience, vol. 14. John Wiley & Sons, Ltd, Feb 2002, pp. 1175–1220.
Authors
Amr Farouk received the Bachelor engineering from the Military Technical College
(MTC), Cairo, Egypt, in 1997, and the Masters' engineering degrees from Engineering
faculty, Mansoura university, Mansoura, Egypt in 2009. He is currently a PhD arguing
from Computer engineering, MTC, Cairo, Egypt. His research interests include network
security, authentication protocols, certificate-less authenticated key agreement.
M. M. Fouad received the Bachelor engineering (honors, with great distinction) and
Masters' engineering degrees from the Military Technical College (MTC), Cairo, Egypt, in
1996 and 2001, respectively. As well, he received the Ph.D. degree in Electrical and
Computer engineering from Carleton University, Ottawa, Ontario, Canada, in 2010. He is
currently a faculty member with the Department of Computer Engineering, MTC. His
research interests are in online handwritten recognition, image registration, image
reconstruction, super-resolution, video compression and multiview video coding.
Ahmed A. AbdelHafez; received the B.S. and M.Sc. in Electrical Engineering from
Military Technical College (MTC) in 1990, 1997 respectively, and his Ph.D from School
of Information Technology and Engineering (SITE), University of Ottawa, Ottawa,
Canada in 2003. Dr. Abdel-Hafez is the head of the Cryptography Research Center
(CRC), Egypt where he is leading many applied researches in communication security
field. He is a visiting lecturer in Communication Dept. MTC, and other universities in
Egypt. Dr. Abdel-hafez published more than 40 papers in specialized conferences and
periodicals. His research interests include wireless networks and data security, mathematical cryptography
and provable security.
21