GCRC Meeting 2004 Introduction to the Grid and Security Philip Papadopoulos.

Slides:



Advertisements
Similar presentations
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Advertisements

Distributed Data Processing
Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
ASCR Data Science Centers Infrastructure Demonstration S. Canon, N. Desai, M. Ernst, K. Kleese-Van Dam, G. Shipman, B. Tierney.
High Performance Computing Course Notes Grid Computing.
Distributed Systems 1 Topics  What is a Distributed System?  Why Distributed Systems?  Examples of Distributed Systems  Distributed System Requirements.
Condor-G: A Computation Management Agent for Multi-Institutional Grids James Frey, Todd Tannenbaum, Miron Livny, Ian Foster, Steven Tuecke Reporter: Fu-Jiun.
A Computation Management Agent for Multi-Institutional Grids
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
National Center for Supercomputing Applications Integrating MyProxy with Site Authentication Jim Basney Senior Research Scientist National Center for Supercomputing.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
1 Introduction to XML. XML eXtensible implies that users define tag content Markup implies it is a coded document Language implies it is a metalanguage.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Chapter Goals Describe client/server and multi-tier application architecture and discuss their advantages compared to centralized applications Explain.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System architectures Updated: November 2014.
Milos Kobliha Alejandro Cimadevilla Luis de Alba Parallel Computing Seminar GROUP 12.
Ch 12 Distributed Systems Architectures
Systems Architecture, Fourth Edition1 Internet and Distributed Application Services Chapter 13.
2 Systems Architecture, Fifth Edition Chapter Goals Describe client/server and multi-tier application architecture and discuss their advantages compared.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
DISTRIBUTED COMPUTING
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
SPRING 2011 CLOUD COMPUTING Cloud Computing San José State University Computer Architecture (CS 147) Professor Sin-Min Lee Presentation by Vladimir Serdyukov.
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
WP6: Grid Authorization Service Review meeting in Berlin, March 8 th 2004 Marcin Adamski Michał Chmielewski Sergiusz Fonrobert Jarek Nabrzyski Tomasz Nowocień.
A Brief Overview by Aditya Dutt March 18 th ’ Aditya Inc.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Quality Attributes of Web Software Applications – Jeff Offutt By Julia Erdman SE 510 October 8, 2003.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Cloud Computing 1. Outline  Introduction  Evolution  Cloud architecture  Map reduce operation  Platform 2.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
DISTRIBUTED COMPUTING
Lecture 3: Sun: 16/4/1435 Distributed Computing Technologies and Middleware Lecturer/ Kawther Abas CS- 492 : Distributed system.
GT Components. Globus Toolkit A “toolkit” of services and packages for creating the basic grid computing infrastructure Higher level tools added to this.
1 School of Computer, National University of Defense Technology A Profile on the Grid Data Engine (GridDaEn) Xiao Nong
Lecture 15 Introduction to Web Services Web Service Applications.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
Using NMI Components in MGRID: A Campus Grid Infrastructure Andy Adamson Center for Information Technology Integration University of Michigan, USA.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Web Services BOF This is a proposed new working group coming out of the Grid Computing Environments Research Group, as an outgrowth of their investigations.
Wrapping Scientific Applications As Web Services Using The Opal Toolkit Wrapping Scientific Applications As Web Services Using The Opal Toolkit Sriram.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
What is SAM-Grid? Job Handling Data Handling Monitoring and Information.
Hwajung Lee.  Interprocess Communication (IPC) is at the heart of distributed computing.  Processes and Threads  Process is the execution of a program.
Practical Distributed Authorization for GARA Andy Adamson and Olga Kornievskaia Center for Information Technology Integration University of Michigan, USA.
GRID Overview Internet2 Member Meeting Spring 2003 Sandra Redman Information Technology and Systems Center and Information Technology Research Center National.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
1 Kerberos – Private Key System Ahmad Ibrahim. History Cerberus, the hound of Hades, (Kerberos in Greek) Developed at MIT in the mid 1980s Available as.
IIS and.Net security -Vasudha Bhat. What is IIS? Why do we need IIS? Internet Information Services (IIS) is a Web server, its primary job is to accept.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Development of e-Science Application Portal on GAP WeiLong Ueng Academia Sinica Grid Computing
Web Services An Introduction Copyright © Curt Hill.
Intro to Web Services Dr. John P. Abraham UTPA. What are Web Services? Applications execute across multiple computers on a network.  The machine on which.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
MGRID Architecture Andy Adamson Center for Information Technology Integration University of Michigan, USA.
The GRIDS Center, part of the NSF Middleware Initiative Grid Security Overview presented by Von Welch National Center for Supercomputing.
Distributed Systems Ryan Chris Van Kevin. Kinds of Systems Distributed Operating System –Offers Transparent View of Network –Controls multiprocessors.
PARALLEL AND DISTRIBUTED PROGRAMMING MODELS U. Jhashuva 1 Asst. Prof Dept. of CSE om.
Internet and Distributed Application Services
Distributed Systems Bina Ramamurthy 11/30/2018 B.Ramamurthy.
Presentation transcript:

GCRC Meeting 2004 Introduction to the Grid and Security Philip Papadopoulos

An Introduction to the Grid  Definition – Grid software allows a user to assemble remote resources and treat them as if they were local Uses a scalable security model Does not require centralized administration Does not require sites to give up administrative control of their resource  Simple Example A Morphometric BIRN researcher wants to test a new image segmentation program on brain image data.  The computing cluster is in San Diego  The Brain Data is physically stored at centers in Harvard, UCI, and Duke

What a Grid Is not  It’s not free computing  It does not replace large-scale “supercomputers”  Putting your resource on the grid does not mean anybody can use it  Note: Grid and “Cyberinfrastructure” are two words that describe the same thing

How is a Grid different from the Web ? FeatureWebGrid Physical Connections Ethernet, ATM, SONET, … Same User Identification Managed per site Single Sign On Program Access Web Browser (http protocol) Multiple programs and protocols SearchingGoogleWell-defined meta data and databases Starting User- defined Programs Not SupportedVery Flexible

Abridged History of Distributed Computing  Classification by administrative domain  1980 Single administrative domain  SUN NFS (file sharing)  Yellow Pages (authentication)  Remote shell (task creation)  1990 Virtual User Administrative Domain  A user logs onto various machines and runs software that makes these appear as a single system Example PVM (Parallel Virtual Machine)  Mid 90’s - Clusters  Message passing (MPI) used for communication  Usually a single administrative domain

Abridged History Continued  Mid 90’s. Cooperating (Mutual Trust) Domains  Kerberos and CORBA  Trust is administered centrally  Late 90’s. Grid Systems  Public Key Certificates identified individual users. All or nothing domain trust not needed  Mechanisms for interprocess communication needed re-visting  More like Virtual User Domains early 90’s but with a more scalable security model  Example: Globus, Avaki, United Devices,

Clusters - The New Workstation  Commodity CPUs  Supercomputer-class performance  Easily replicated to form a distributed grid of computing and storage  Canonical IT platform for Biology  You may want/need access to cluster located at another site One of many clusters at UCSD. 256 Programs

“Wrapping” Resources for Symmetry Grid Interface Grid User Site Policies Grid Interface Standard Internet Network Site Policies Grid Interface Site Policies Grid Interface Site Policies Grid Interface Grid User Grid Interface provides security, identity Mapping, resource access/abstraction

How Grid Computing has Evolved  The Grid interface has evolved from scripts to a services based architecture  Service - a resource that has a well-defined programmatic interface that can be called remotely  A Web Service – a resource that can be called remotely using SOAP ( Simple Object Access Protocol ). Example: google in your web browser toolbar  A Grid Service – uses SOAP or other protocols with a defined authentication interface  Application – software that utilizes one or more services to work on the grid

What are Some Key Issues?  Some programs need to be re-engineered to work with non-local resources  Many programs need to explicitly carry a security credential (and not rely on a single administrative domain for implied authentication)  A culture of sharing resources and data among colleagues needs to be developed  Robustness of underlying grid middleware is being improved – (government investment, private investment) – but improvements are still needed

Summary  There is no magic program that takes existing code and makes it work with the grid.  Grid (or cyberinfrastructure) is an evolution of the web Security explicitly addressed Services programming model requires some change to applications  Benefits Utilizing and bridging remote resources is analogous bringing critical knowledge and information to you.

GCRC Meeting 2004 Grid Security Philip Papadopoulos

What is Grid Security?  Cooperating entities accept a cryptographically secure identification certificate  The certificate uniquely identifies a user or a resource Think of it as a passport  A resource interprets a presented certificate to determine whether access should be granted

GSI  GSI – Grid Security Infrastructure  A Certificate Authority creates a grid identity for a user (or resource) X.509 Certificate  A resource provider decides which Certificate Authorities it will trust https websites use Verisign, Thawte, Other Commercial and Private Certificates.  When a user signs on to the grid a time-limited proxy is generated. It is the proxy that is interpreted by a site

Simplified Grid Services Client (Requestor ) read rawdata; call.setTargetObjectURI("urn:gtomo-svc") call.setMethodName(“backproject") Call.setParams(“unprocesseddata”,rawdata) Response = invoke(call, result = Response.getReturnValue(); GSI Processed Response 1. client formats request (parameters + security) 2. Provider starts instance of service for client 3. Results returned over net Backproject instance Formatted Request Service Provider Grid services leverages web service infrastructure

Enable Workflows in a Grid Service-Oriented Environment Interface CCDB Back- project GSI Proxy User Sign on Art/Blobs Osaka U. PACI Resources Ucsd.edu Common Security, discovery, and instantiation framework of Grid services enables construction of complex workflows that crosses domains

Pros and Cons of Grid Certificates  X.509 proxies allow us to program workflows and maintain a secure identity This is known as single sign on  User management of certificates can be burdensome Online certificate “banks” can simplify this  Software systems have to be modified to accept certificates for authentication  The certificate is only identity management, deciding what a user can do (authorization) still needs work.  Like any new software, management isn’t 0 But, projects like BIRN are significantly easing this transition