Security Issues and Challenges in High Performance Grid Computing SASA SUBOTIC SASA SUBOTIC University of Pretoria
“…if you think that technology can solve your security problems then you don’t know enough about the technology, and worse you don’t know what your problems are…” Bruce Schneier, Secrets and Lies in a Digital Networked World Grid Scenario Grid Security Threats and Risks Technology Platform Vulnerabilities Technology Platform Vulnerabilities Confidentiality and Data Integrity Confidentiality and Data Integrity Disruption of infrastructure Disruption of infrastructure Non intentional or accidental Non intentional or accidental Grid Security
10 Security Ingredients Authentication, Authorization, Access Control, Authentication, Authorization, Access Control, Audit/Accounting, Confidentiality, Availability, Audit/Accounting, Confidentiality, Availability, Privacy, Integrity, Fabric Management, Trust Privacy, Integrity, Fabric Management, Trust Technologies IPSec and IPv6, VPN, Firewalls, GSS-API IPSec and IPv6, VPN, Firewalls, GSS-API Challenges Technical and Social challenges, Manageability, Technical and Social challenges, Manageability, Usability and Scalability Usability and Scalability
Security Related Models GSI, CAS, OGSA GSI, CAS, OGSA Grid Computing Infrastructures Globus, Legion, Condor Globus, Legion, Condor Grid Security Appendix on Grid Security Security Requirements, Security Policy, Security Requirements, Security Policy, Security Management, Security Problems Security Management, Security Problems
DEMO Registering Users For The Earth System Grid The Challenge The Solution: PURSE Results Portal - Based User Portal - Based User Registration Service Registration Service
Step 1: Login Request a new account Request a new account Step 2: Request Account I'm interested in seeing PURSE in action I'm interested in seeing PURSE in action DEMO Step 3: Message, , Message Confirm request - security Confirm request - security Step 4: One or two days later One or two days later Step 5: Account created