Security Issues and Challenges in High Performance Grid Computing SASA SUBOTIC SASA SUBOTIC University of Pretoria.

Slides:



Advertisements
Similar presentations
Case Study 2: User Registration for the Earth System Grid.
Advertisements

U M T S F o r u m © UMTS 2002 UMTS Security aspects UMTS Forum ICTG Chair Bosco Fernandes Siemens AG
5-Dec-02D.P.Kelsey, GridPP Security1 GridPP Security UK Security Workshop 5-6 Dec 2002, NeSC David Kelsey CLRC/RAL, UK
Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
- 1 - Defense Security Service Background: During the Fall of 2012 Defense Security Service will be integrating ISFD with the Identity Management (IdM)
Stonesoft Roadmap WHAT FEATURES WILL COME IN
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Lecture 2: Security Rachana Ananthakrishnan Argonne National Lab.
Grid Security. Typical Grid Scenario Users Resources.
Generic AAA model in Grids IRTF - AAAARCH meeting IETF 52 – Dec 14 th Salt Lake City Leon Gommans Advanced Internet Research Group.
Security Issues in Grid Computing Reading: Grid Book, Chapter 16: “Security, Accounting and Assurance” By Clifford Neuman.
The New World of Security for Business Travellers Anurag Lal Senior Vice President Strategic Services & Business Development Wi-Fi Business Development.
Military Technical Academy Bucharest, 2006 SECURITY FOR GRID INFRASTRUCTURES - Grid Trust Model - ADINA RIPOSAN Department of Applied Informatics.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Network Insecurity: challenging conventional wisdom Terry Gray UW Computing & Communications 10 October 2000.
AutoSignon - A Reference Implementation of a Secure Single Sign-On Blackboard Building Block TM Richesh Ruchir, Technical Manager
SIP Security Matt Hsu.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Public Key Infrastructure Ammar Hasayen ….
Mobile Identity and Mobile Authentication (mobile e-signature) Valdis Janovs Sales Director Lattelecom Technology SIA.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Mobile Computing - Security Issues - Advisor : Dr. Celeste Team Number : 張耕瑋 黃峻亨 楊銘鴻 李昌諭 吳政穎 陳建廷.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
12/9-10/2009 TGDC Meeting NIST Research on UOCAVA Voting Andrew Regenscheid National Institute of Standards and Technology
1 School of Computer, National University of Defense Technology A Profile on the Grid Data Engine (GridDaEn) Xiao Nong
Hao Wang Computer Sciences Department University of Wisconsin-Madison Security in Condor.
Grid Security Issues Shelestov Andrii Space Research Institute NASU-NSAU, Ukraine.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Information Security What is Information Security?
Privacy, Confidentiality, and Security Component 2/Unit 8c.
GRID ARCHITECTURE Chintan O.Patel. CS 551 Fall 2002 Workshop 1 Software Architectures 2 What is Grid ? "...a flexible, secure, coordinated resource- sharing.
By: Sambit Pulak XI-IB. Authenticity means establishing a user ’ s identity beyond reasonable doubt. Authenticating the user is crucial in many scenarios,
Security, Accounting, and Assurance Mahdi N. Bojnordi 2004
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
Remarks on OGSA and OGSI e-Science All Hands Meeting September Geoffrey Fox, Indiana University.
INSA LYON1 Security Policy Configuration Issues in Grid Computing Environments George Angelis, Stefanos Gritzalis, and Costas Lambrinoudakis Presentation.
Csci5233 Computer Security & Integrity 1 Overview of Security & Java (based on GS: Ch. 1)
Ingredients of Security
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
GSI: Security On Teragrid A Introduction To Security In Cyberinfrastructure By Dru Sepulveda.
Office of Science U.S. Department of Energy Grid Security at NERSC/LBL Presented by Steve Chan Network, Security and Servers
Security Solutions Rachana Ananthakrishnan University of Chicago.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
E-Science Security Roadmap Grid Security Task Force From original presentation by Howard Chivers, University of York Brief content:  Seek feedback on.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Collaborative Tools for the Grid V.N Alexandrov S. Mehmood Hasan.
1 US Higher Education Root CA (USHER) Update Fed/Ed Meeting December 14, 2005 Jim Jokl University of Virginia.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Fundamentals of Network Security Ravi Mukkamala SCI 101 October 6, 2003.
UNIT 7 SEMINAR Unit 7 Chapter 9, plus Lab 13 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours: Tuesday.
UCTrust Integration for UC Grid David Walker University of California, Davis ucdavis.edu Kejian Jin University of California, Los Angeles kjin.
Munix Bus WiFi Authentication, Log Management, Internet Security, Content Filter & VPN Service Internet Gateway & Business Intelligence
Information Protection & Cyber Security
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Current Structure of eHealth
SECURITY MECHANISM & E-COMMERCE
Security in ebXML Messaging
امنیت شبکه علی فانیان
Lorenzo Biasiolo 3°AI INFORMATION SECURITY.
Identity and Trust Management Platform in DICOM
CS 575 – Drexel University – Fall 2007
ITU-T Workshop on Security, Seoul (Korea), May 2002
Mohammad Alauthman Computer Security Mohammad Alauthman
Presentation transcript:

Security Issues and Challenges in High Performance Grid Computing SASA SUBOTIC SASA SUBOTIC University of Pretoria

“…if you think that technology can solve your security problems then you don’t know enough about the technology, and worse you don’t know what your problems are…” Bruce Schneier, Secrets and Lies in a Digital Networked World Grid Scenario Grid Security Threats and Risks Technology Platform Vulnerabilities Technology Platform Vulnerabilities Confidentiality and Data Integrity Confidentiality and Data Integrity Disruption of infrastructure Disruption of infrastructure Non intentional or accidental Non intentional or accidental Grid Security

10 Security Ingredients Authentication, Authorization, Access Control, Authentication, Authorization, Access Control, Audit/Accounting, Confidentiality, Availability, Audit/Accounting, Confidentiality, Availability, Privacy, Integrity, Fabric Management, Trust Privacy, Integrity, Fabric Management, Trust Technologies IPSec and IPv6, VPN, Firewalls, GSS-API IPSec and IPv6, VPN, Firewalls, GSS-API Challenges Technical and Social challenges, Manageability, Technical and Social challenges, Manageability, Usability and Scalability Usability and Scalability

Security Related Models GSI, CAS, OGSA GSI, CAS, OGSA Grid Computing Infrastructures Globus, Legion, Condor Globus, Legion, Condor Grid Security Appendix on Grid Security Security Requirements, Security Policy, Security Requirements, Security Policy, Security Management, Security Problems Security Management, Security Problems

DEMO Registering Users For The Earth System Grid The Challenge The Solution: PURSE Results Portal - Based User Portal - Based User Registration Service Registration Service

Step 1: Login Request a new account Request a new account Step 2: Request Account I'm interested in seeing PURSE in action I'm interested in seeing PURSE in action DEMO Step 3: Message, , Message Confirm request - security Confirm request - security Step 4: One or two days later One or two days later Step 5: Account created