1 Constructing trusted virtual execution environment in P2P grids Authors: D. Zou, W. Zheng, J. Long, H. Jin, and X. Chen Source: Future Generation Computer.

Slides:



Advertisements
Similar presentations
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Advertisements

Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
ARGUGRID Use Case using Instrumentation Mary Grammatikou National Technical University of Athens OGF 2009, Catania.
1 P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains Authors: P. Dewan and P. Dasgupta Source: IEEE Transactions.
11 Efficient and Secure Certificateless Authentication and Key Agreement Protocol for Hybrid P2P Network Authors: Z. B. Xu and Z. W. Li Source: The 2nd.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
Automatic software deployment using user-level virtualization for cloud-computing Future Generation Computer System (2013) Youhui Zhang, Yanhua Li, Weimin.
1 Fingerprint verification Speaker: Shu-Fen Chiou ( 邱淑芬 ) Date:2005/06/03.
INFSO-RI An On-Demand Dynamic Virtualization Manager Øyvind Valen-Sendstad CERN – IT/GD, ETICS Virtual Node bootstrapper.
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
To run the program: To run the program: You need the OS: You need the OS:
Data Deduplication in Virtualized Environments Marc Crespi, ExaGrid Systems
Automatic software deployment using user-level virtualization for cloud-computing Future Generation Computer System (2013) Youhui Zhang, Yanhua Li, Weimin.
Assessment of Core Services provided to USLHC by OSG.
1 A Collaboration Scheme for Making Peer-to-Peer Anonymous Routing Resilient Authors: X. Wang and J. Luo Source: 12th International Conference on Computer.
Andy Bavier, PlanetWorks Scott Baker, SB-Software July 27, 2011.
+ CS 325: CS Hardware and Software Organization and Architecture Cloud Architectures.
UI and Data Entry UI and Data Entry Front-End Business Logic Mid-Tier Data Store Back-End.
1 Tongji University Rong Chen 3/1/2005 OS Research Trends and Elastos Overview.
Grid Security Issues Shelestov Andrii Space Research Institute NASU-NSAU, Ukraine.
1 A secure model for controlling the hubs in P2P wireless network based on trust value Authors: Y. Liu, N. Xiong, K. Xu, J. H. Park, and C. Lin Source:
服务计算技术与系统教育部重点实验室 (SCTS) 集群与网格计算湖北省重点实验室 (CGCL) CFCC: Covert Flows Confinement For VM Coalitions Ge Cheng, Hai Jin, Deqing Zou, Lei Shi, and Alex K. Ohoussou.
University of Westminster – Y. Zetuny, G. Terstyanszky, S. Winter, P. Kacsuk Centre for Parallel Computing Cavendish School of Informatics.
First experience of submission to the EGEE/RDIG Grid of jobs prepared for non standart OSs by means of virtualization. I.Gorbunov, A.Kryukov SINP MSU,
Image Management and Rain on FutureGrid: A practical Example Presented by Javier Diaz, Fugang Wang, Gregor von Laszewski.
InstantGrid: A Framework for On- Demand Grid Point Construction R.S.C. Ho, K.K. Yin, D.C.M. Lee, D.H.F. Hung, C.L. Wang, and F.C.M. Lau Dept. of Computer.
1 Proteomics: APPROACHES AND IMAGE ANALYSIS TOOLS FOR DRUG DISCOVERY Authors: Sophia R. HE, Edmond J. Breen and Sybille M. N. Hunt Source: ICME 2003, pp.
Image Management and Rain on FutureGrid Javier Diaz - Fugang Wang – Gregor von.
WNoDeS – Worker Nodes on Demand Service on EMI2 WNoDeS – Worker Nodes on Demand Service on EMI2 Local batch jobs can be run on both real and virtual execution.
Performance Evaluation of Image Conversion Module Based on MapReduce for Transcoding and Transmoding in SMCCSE Speaker : 吳靖緯 MA0G IEEE.
1 Catania, 4 th EEGE User Forum/OGF 25, OurGrid integration with gLite based grids in EELA-2 Francisco Brasileiro Universidade.
1 Bounding Virus Proliferation in P2P Networks with a Diverse-Parameter Trust Management Scheme Authors: C. Lin and R. C. Roberto Source: IEEE Communications.
Association with the Gilda Virtual Organization Certificate,VO membership, and MyProxy Server usage.
Self-service Cloud Computing Presented by: Yu Bai (ybai181) Butt, S., Lagar-Cavilla, H. A., Srivastava, A., & Ganapathy, V. (2012, October). Self-service.
Virtual Workspaces Kate Keahey Argonne National Laboratory.
1 A peer mutual authentication method on super peer based peer-to- peer network Authors: Byeong-Thaek Oh, Sang-Bong Lee, and Ho-Jin Park Source: IEEE International.
Partition and multi-path transmission-An encryption-free reputation sharing protocol in Gnutella-like peer-to-peer network Author: X. X. Ma, and Z. G.
Chapter 6 An Introduction to System Software and Virtual Machines.
VIRTUAL MACHINES AND OPEN SOURCE SOFTWARE Installing multiple Operating Systems.
1 A connection management protocol for promoting cooperation in Peer-to-Peer networks Authors: Murat Karakaya, Ibrahim Korpeoglu, and Ozgur Ulusoy Source:
1 Efficient User Authentication and Key Management for Peer-to- Peer Live Streaming Systems Authors: X. Liu, Y. Hao, C. Lin, and C. Du Source: Tsinghua.
Copyright © 2011, A New MMOG Framework On Cloud Computing Environment 張晏誌 1.
1 Source: Journal of Chemical Information & Computer Sciences, 2003, vol.43, pp Authors: K. Kaczmarek, B. Walczak, S. de Jong, and B. G. M. Vandeginste.
Conference name Company name INFSOM-RI Speaker name The ETICS Job management architecture EGEE ‘08 Istanbul, September 25 th 2008 Valerio Venturi.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
Ian Gable University of Victoria 1 Deploying HEP Applications Using Xen and Globus Virtual Workspaces A. Agarwal, A. Charbonneau, R. Desmarais, R. Enge,
Trusted Virtual Machine Images a step towards Cloud Computing for HEP? Tony Cass on behalf of the HEPiX Virtualisation Working Group October 19 th 2010.
Glite. Architecture Applications have access both to Higher-level Grid Services and to Foundation Grid Middleware Higher-Level Grid Services are supposed.
NTU Cloud 2010/05/30. System Diagram Architecture Gluster File System – Provide a distributed shared file system for migration NFS – A Prototype Image.
1 Biometric template selection and update: a case study in fingerprints Source:Pattern Recognition, Vol. 37, 2004, pp Authors: Umut Uludag, Arun.
1 Grid Activity Summary » Grid Testbed » CFD Application » Virtualization » Information Grid » Grid CA.
Local Correlation-based Fingerprint Matching
1 Signature Protocol for Peer-to- peer Massively Multiplayer Online Games Speaker: Shu-Fen Chiou ( 邱淑芬 )
Grid Computing Unit I Introduction. Information anytime anywhere!!! support computation across administrative domains Generally  virtualizing computing.
Securing the Grid & other Middleware Challenges Ian Foster Mathematics and Computer Science Division Argonne National Laboratory and Department of Computer.
1 SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networks Authors: Xiaowei Chen, Kaiyong Zhao, and Xiaowen Chu Source: Autonomic and Trusted.
Grid testing using virtual machines Stephen Childs*, Brian Coghlan, David O'Callaghan, Geoff Quigley, John Walsh Department of Computer Science Trinity.
Developing GRID Applications GRACE Project
Group # 14 Dhairya Gala Priyank Shah. Introduction to Grid Appliance The Grid appliance is a plug-and-play virtual machine appliance intended for Grid.
PARALLEL AND DISTRIBUTED PROGRAMMING MODELS U. Jhashuva 1 Asst. Prof Dept. of CSE om.
Inspirirani ljudima. Ugasite mobitele. Hvala.. Paolo Pialorsi Senior Consultant PiaSys ( Publishing apps for SharePoint 2013 on Microsoft.
Developing resource consolidation frameworks for moldable virtual machines in clouds Author: Liang He, Deqing Zou, Zhang Zhang, etc Presenter: Weida Zhong.
PRAGMA18 Demonstration 2-4 March 2010 Kei Kokubo, Yasuyuki Kusumoto, Susumu Date Osaka University, Cybermedia Center Wen-Wai Yim, Jason Haga Department.
Trusted Virtual Machine Images the HEPiX Point of View Tony Cass October 21 st 2011.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) gLite Grid Introduction Salma Saber Electronic.
Workspace Management Services Kate Keahey Argonne National Laboratory.
Prof. Jong-Moon Chung’s Lecture Notes at Yonsei University
Accessing the VI-SEEM infrastructure
Comparison of LAN, MAN, WAN
DevOps in action The next level of virtualization
Presentation transcript:

1 Constructing trusted virtual execution environment in P2P grids Authors: D. Zou, W. Zheng, J. Long, H. Jin, and X. Chen Source: Future Generation Computer Systems, vol. 26, pp , 2010 Speaker: Shu-Fen Chiou ( 邱淑芬 )

2 P2P Grid Domain 1 Domain controller VM based backend peer VM based backend peer P2P Grid management infrastructure Domain n Domain controller VM based backend peer VM based backend peer user Ask a job help e.g. Computing a problem

3 Virtual based backend peer Using virtual machine runs the user ’ s job The virtual machine (VM) image is matched requirements user ’ s job Virtual machine image: OS Application The OS and application middleware are not secure. Domain 1 Domain controller VM based backend peer VM based backend peer user Ask a job help

4 Motivation Construction a trusted execution environment on P2P grid nodes. The VM images are verified and protected. The backend peer is selected by its reputation.

5 VM-based P2P grid architecture

6 Trusted image store Cer CA  uj, REQ (AC IMi  uj ) AC IMi  uj Cer CA  uj, img, S u j (SHA1(img)), AC img  uj Cer CA  IS i, REQ(CER CA  img ) Cer CA  img

7 Trusted image deployment job select job (img, BE i ) verify(img) launch(VM) img According the reputation

8 Backup job img i+1, S uj (SHA1(img i+1 )), Cer CA  imgi, P(Cer CA  uj ),

9 Analysis Overhead for trusted image store when a new image is submitted