Abstract
The grid computing paradigm involves both the availability of abundant computing resources, and the storage of increased amounts of valuable data. Such information systems heavily rely upon the provision of adequate security. It is imperative that techniques be developed to assure the trustworthiness of these environments. Formal verification provides the tools and techniques to assess whether systems are indeed trustworthy, and is an established approach for security assurance. When using formal verification for security assessment one of the most important concerns should be to be precise about the threat model. A comprehensive threat model is indispensable for the simulations of a grid security model. This article presents a survey of the various threat models and discusses how and when these threat models may be inappropriate for use in the grid computing environments. Then a fine-grained threat model for grid computing is presented.
This research is supported by the European Commission funded project SEINIT (Security Expert Initiative) under reference number IST-2002-001929-SEINIT. The overall objective of the SEINIT project is to ensure a trusted security framework for ubiquitous environments, working across multiple devices and heterogeneous networks, in a way that is organization independent (inter-operable) and centered around an end-user. Project webpage is located at www.seinit.org.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Lorch, M., Kafura, D.: Grid Community Characteristics and their Relation to Grid Security. Technical Report TR-03-20, Computer Science, Virginia Tech. (June 2003)
Broadfoot, P., Martin, A.: A Critical Survey of Grid Security Requirements and Technologies. Technical Report PRG-RR-03-15, Oxford University Computing Laboratory (August 2003)
Final Conference Report, The Accelerating Trustworthy Internetworking Workshop (ATI2004) (April 2004), http://gtisc.gatech.edu/ati2004/ATI_Report_FINAL_4-25-04.pdf
Jackson, T., Austin, J., Fletcher, M., Jessop, M.: Delivering a Grid enabled Distributed Aircraft Maintenance Environment (DAME). In: Proceedings of UK e-Science All Hands Meeting 2003 (AHM 2003), Nottingham, UK, September 2-4 (2003)
Fu, Y., Chase, J., Chun, Schwab, S., Vahdat, A.: SHARP: An Architecture for Secure Resource Peering. In: Proceedings of the 19th ACM Symposium on Operating Systems Principles, Bolton Landing, NY (August 2003)
Whitaker, A., Shaw, M., Gribble, S.: Denali: Lightweight Virtual Machines for Distributed and Networked Applications. University of Washington Technical Report February 02 (2001)
The Cascade Project – Media Networks Laboratory, Department of Computer Science. Stony Brook University, http://www.mnl.cs.sunysb.edu/project/cascade
DeFigueiredo, D., Garcia, A., Kramer, B.: Analysis of Peer-to-Peer Network Security using Gnutella. University of California Report (December 2002)
Condie, T., Kamvar, S., Garcia-Molina, H.: Adaptive Peer-to-Peer Topologies. In: Proceedings of the Fourth IEEE International Conference on Peer-to-Peer Computing, Zurich, Switzerland, August 25-27 (2004)
The TeraGrid Project, http://www.teragrid.org
Shread, P.: New Terascale Grid to Simulate Terrorist Attacks. Grid Computing Planet, June 12 (2002), http://www.gridcomputingplanet.com/news/article.php/3281_1365171
Cameron, D., Carvajal-Schiaffino, R., Millar, P., Nicholson, C., Stockinger, K., Zini, F.: OptorSim: A Grid Simulator for Replica Optimisation. In: UK e-Science All Hands Conference, August 31-September 3 (2004)
Ranganathan, K., Foster, I.: Identifying Dynamic Replication Strategies for a High Performance Data Grid. In: Proceedings of the International Grid Computing Workshop, Denver, Colorado, USA (November 2001)
Legrand, A., Marchal, L., Casanova, H.: Scheduling Distributed Applications: The SimGrid Simulation Framework. In: Proceedings of the 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid 2003 (CCGrid2003), May 12-15, pp. 138–145 (2003)
Buyya, R., Murshed, M.: GridSim: A Toolkit for the Modeling and Simulation of Distributed Resource Management and Scheduling for Grid Computing. In: The Journal of Concurrency and Computation: Practice and Experience, pp. 1–32. Wiley Press, Chichester (May 2002)
EDGSim: A Simulation of the European DataGrid, http://www.hep.ucl.ac.uk/~pac/EDGSim
Lamehamedi, H., Shentu, Z., Szymanski, B., Deelman, E.: Simulation of Dynamic Data Replication Strategies in Data Grids. In: Proceedings of the International Parallel and Distributed Processing Symposium 2003 (IPDPS 2003), April 22-26 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Naqvi, S., Riguidel, M. (2005). Threat Model for Grid Security Services. In: Sloot, P.M.A., Hoekstra, A.G., Priol, T., Reinefeld, A., Bubak, M. (eds) Advances in Grid Computing - EGC 2005. EGC 2005. Lecture Notes in Computer Science, vol 3470. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11508380_107
Download citation
DOI: https://doi.org/10.1007/11508380_107
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26918-2
Online ISBN: 978-3-540-32036-4
eBook Packages: Computer ScienceComputer Science (R0)