Nothing Special   »   [go: up one dir, main page]

Skip to main content

Threat Model for Grid Security Services

  • Conference paper
Advances in Grid Computing - EGC 2005 (EGC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3470))

Included in the following conference series:

Abstract

The grid computing paradigm involves both the availability of abundant computing resources, and the storage of increased amounts of valuable data. Such information systems heavily rely upon the provision of adequate security. It is imperative that techniques be developed to assure the trustworthiness of these environments. Formal verification provides the tools and techniques to assess whether systems are indeed trustworthy, and is an established approach for security assurance. When using formal verification for security assessment one of the most important concerns should be to be precise about the threat model. A comprehensive threat model is indispensable for the simulations of a grid security model. This article presents a survey of the various threat models and discusses how and when these threat models may be inappropriate for use in the grid computing environments. Then a fine-grained threat model for grid computing is presented.

This research is supported by the European Commission funded project SEINIT (Security Expert Initiative) under reference number IST-2002-001929-SEINIT. The overall objective of the SEINIT project is to ensure a trusted security framework for ubiquitous environments, working across multiple devices and heterogeneous networks, in a way that is organization independent (inter-operable) and centered around an end-user. Project webpage is located at www.seinit.org.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Lorch, M., Kafura, D.: Grid Community Characteristics and their Relation to Grid Security. Technical Report TR-03-20, Computer Science, Virginia Tech. (June 2003)

    Google Scholar 

  2. Broadfoot, P., Martin, A.: A Critical Survey of Grid Security Requirements and Technologies. Technical Report PRG-RR-03-15, Oxford University Computing Laboratory (August 2003)

    Google Scholar 

  3. Final Conference Report, The Accelerating Trustworthy Internetworking Workshop (ATI2004) (April 2004), http://gtisc.gatech.edu/ati2004/ATI_Report_FINAL_4-25-04.pdf

  4. Jackson, T., Austin, J., Fletcher, M., Jessop, M.: Delivering a Grid enabled Distributed Aircraft Maintenance Environment (DAME). In: Proceedings of UK e-Science All Hands Meeting 2003 (AHM 2003), Nottingham, UK, September 2-4 (2003)

    Google Scholar 

  5. Fu, Y., Chase, J., Chun, Schwab, S., Vahdat, A.: SHARP: An Architecture for Secure Resource Peering. In: Proceedings of the 19th ACM Symposium on Operating Systems Principles, Bolton Landing, NY (August 2003)

    Google Scholar 

  6. Whitaker, A., Shaw, M., Gribble, S.: Denali: Lightweight Virtual Machines for Distributed and Networked Applications. University of Washington Technical Report February 02 (2001)

    Google Scholar 

  7. The Cascade Project – Media Networks Laboratory, Department of Computer Science. Stony Brook University, http://www.mnl.cs.sunysb.edu/project/cascade

  8. DeFigueiredo, D., Garcia, A., Kramer, B.: Analysis of Peer-to-Peer Network Security using Gnutella. University of California Report (December 2002)

    Google Scholar 

  9. Condie, T., Kamvar, S., Garcia-Molina, H.: Adaptive Peer-to-Peer Topologies. In: Proceedings of the Fourth IEEE International Conference on Peer-to-Peer Computing, Zurich, Switzerland, August 25-27 (2004)

    Google Scholar 

  10. The TeraGrid Project, http://www.teragrid.org

  11. Shread, P.: New Terascale Grid to Simulate Terrorist Attacks. Grid Computing Planet, June 12 (2002), http://www.gridcomputingplanet.com/news/article.php/3281_1365171

  12. Cameron, D., Carvajal-Schiaffino, R., Millar, P., Nicholson, C., Stockinger, K., Zini, F.: OptorSim: A Grid Simulator for Replica Optimisation. In: UK e-Science All Hands Conference, August 31-September 3 (2004)

    Google Scholar 

  13. Ranganathan, K., Foster, I.: Identifying Dynamic Replication Strategies for a High Performance Data Grid. In: Proceedings of the International Grid Computing Workshop, Denver, Colorado, USA (November 2001)

    Google Scholar 

  14. Legrand, A., Marchal, L., Casanova, H.: Scheduling Distributed Applications: The SimGrid Simulation Framework. In: Proceedings of the 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid 2003 (CCGrid2003), May 12-15, pp. 138–145 (2003)

    Google Scholar 

  15. Buyya, R., Murshed, M.: GridSim: A Toolkit for the Modeling and Simulation of Distributed Resource Management and Scheduling for Grid Computing. In: The Journal of Concurrency and Computation: Practice and Experience, pp. 1–32. Wiley Press, Chichester (May 2002)

    Google Scholar 

  16. EDGSim: A Simulation of the European DataGrid, http://www.hep.ucl.ac.uk/~pac/EDGSim

  17. Lamehamedi, H., Shentu, Z., Szymanski, B., Deelman, E.: Simulation of Dynamic Data Replication Strategies in Data Grids. In: Proceedings of the International Parallel and Distributed Processing Symposium 2003 (IPDPS 2003), April 22-26 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Naqvi, S., Riguidel, M. (2005). Threat Model for Grid Security Services. In: Sloot, P.M.A., Hoekstra, A.G., Priol, T., Reinefeld, A., Bubak, M. (eds) Advances in Grid Computing - EGC 2005. EGC 2005. Lecture Notes in Computer Science, vol 3470. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11508380_107

Download citation

  • DOI: https://doi.org/10.1007/11508380_107

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26918-2

  • Online ISBN: 978-3-540-32036-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics