SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Downloaden Sie, um offline zu lesen
Presented By: Mohit Modi
           (BT08CSE043)
   The concept of grid computing is not new. In a way, it is nothing
    but parallel or distributed computing; however, the difference
    lies in the scale and complexity! So imagine parallel processing
    at a level where instead of sharing one or more resources, each
    and every computing resource is shared among all the
    computers within the network (as if they form an interconnected
    grid). Now imagine that the grid can consist of several different
    authorized heterogeneous systems, even owned by different
    organizations! It would be like a huge supercomputer with
    unmatched processing power, memory capacity and data storage
    capacity suitable for the most complex computations, but really
    it is just a network of interconnected computers. As far as the
    user of a grid computer is concerned, he/she is just using the
    local computer (now a supercomputer owing to the grid links)
    unaware of the links contributing to the power and enormous
    complexity of the network grid or cluster to which that machine
    belongs.
       In order to provide:
   ◦   Confidentiality
   ◦   Authentication
   ◦   Message integrity
   ◦   Nonrepudiation

       But Grid Security is difficult:
   ◦ Use of valuable resources, solving sensitive problems
   ◦ Distinct domains (own policies, procedures)
   ◦ A single computation might require a large and
   unpredictable set of resources
   ◦ Broad availability and applicability
   Motivations:
     Secure communication (authentication and
   perhaps confidentiality) between elements of
   a computational Grid.
     Security across organizational boundaries,
   thus prohibiting a centrally-managed security
   system.
     “Single sign-on" for users of the Grid,
   including delegation of credentials for
   computations that involve multiple resources
   and/or sites.
     Also known as Public Key Infrastructure
    (PKI).
     User (or entity) gets a related key pair:
   ◦ A private key - known only to the user.
   ◦ A public key – in the public domain.
    A message encrypted with one key requires
   the other key for decryption.
    Digitally "sign" a piece of information
   using public key cryptography.
    To sign a piece of information:
   ◦ The sender computes a mathematical hash of the
   information.
   ◦ Using the private key, he/she encrypts the hash, and
    attaches
   it to the message (the recipient has the public key).
    To authenticate the information:
   ◦ The recipient computes the hash using the same algorithm.
   ◦ Using the public key, he/she decrypts the encrypted hash.
    Match? – Then the sender has signed the message
   and it is intact.
     The Certificate - a central concept in GSI
   authentication.
     It identifies and authenticates every user and
   service on the Grid.
     A GSI certificate includes four primary pieces of
   information:
   ◦ A subject name, which identifies the person or object
   that the certificate represents.
   ◦ The public key belonging to the subject.
   ◦ The identity of a Certificate Authority (CA) that has
   signed the certificate to certify that the public key and
   the identity both belong to the subject.
   ◦ The digital signature of the named CA.
    GSI certificates are encoded in the X.509
   certificate format (a standard data format for
   certificates established by IETF). This certificate:
   ◦ identifies the subject and his/her institution;
   ◦ is created for the subject by the subject’s institution.
       An X.509 certificate includes:
   ◦   subject’s name;
   ◦   subject’s public key;
   ◦   name of the issuing CA;
   ◦   signature of issuing CA;
   ◦   validity dates (start and end dates);
   ◦   other - version information, etc.
At the end, Alice and Bob have established a
connection to each other and are certain
that they know each other’s identities.
     GSI does not establish confidential
   (encrypted) communication between
   parties (by default).
     If it is desired, GSI can easily be
   used to establish a shared key for
   encryption.
     Related security feature – communication
   integrity.
   ◦ Integrity means that an eavesdropper may be able to
   read communication between two parties but is not
   able to modify the communication in any way.
    GSI provides communication integrity by
    default.
     Delegation capability in GSI – an extension of
    the
   standard SSL protocol which reduces the number
   of times the user must enter his passphrase.
     A user needs to re-enter his/her passphrase if:
   ◦ several Grid resources are required for a computation;
   ◦ agents (local or remote) request services on behalf of a
   user;
   ◦ etc.
    How to avoid this? - Create a proxy.
    A proxy consists of a new certificate and a
   private key.
    The new certificate (proxy certificate):
   ◦ contains the owner's identity, modified slightly to
   indicate that it is a proxy;
   ◦ is signed by the owner, rather than a CA.
    Proxies have limited lifetimes.
   ◦ The proxy certificate includes a time notation
    after
   which the proxy should no longer be accepted by
   others.
     The proxy's private key might be stored in a local
   storage system without being encrypted (since
   the proxy is not valid for very long).
     Mutual authentication when using proxies:
   ◦ The remote party receives the proxy's certificate (signed by the owner) and the
   owner's certificate.
   ◦ The signature on the proxy certificate is validated using the owner's public key
   (obtained from his/her certificate).
   ◦ The signature on the owner's certificate is validated using the CA's public key.
   ◦ A chain of trust from the CA to the proxy through the owner is established.
     Single sign-on – used when there are service
   requests travelling through multiple security
   domains in GSI.
     GSI uses proxy certificates for single sign-on and
   delegation of rights to other entities.
What is really needed is to reduce the amount of
work the service has to do to establish
authorization, without doing so by looking up the
actual person. This is the sort of task that has been
given to RBAC mechanisms. However the traditional
view of people being given roles does not work very
well in the grid either. The main issues are that it is
very difficult to give people meaningful roles, and
people understand different things by those roles.
They do however make authorization much simpler as
you are only checking whether a certain role can use
a service.
Grid Computing                                          Cloud Computing

                 Typically, grid infrastructures are accessed by          A customer accessing a cloud infrastructure or
                 multiple, heterogeneous organizations or project         service will pay the cloud provider on a pay-per-use
                 teams that typically share a common goal and need        basis. The business model relies on optimizing
                 access to a virtual supercomputer to work on a single    utilization such that the cost makes sense for the
                 task or a single set of tasks. However, the users or     customer as well as brings profits to the provider.
                 project sponsors would have to bear the enormous
                 cost of setting up and maintaining and monitoring        We can perhaps associate it to the use of utilities
                 the grid.                                                such as electricity, gas, etc., or purchasing in bulk,
Business Model                                                            but only when there's a requirement or demand. The
                 When compared to accessing a cloud infrastructure        benefit is in achieving economies of scale. It's
                 that charges only as per consumption of resources,       independent of whether the task requires
                 the set-up costs of a grid along with the cost of        computational power or increased storage capacity.
                 ownership of resources (like network administration,
                 maintenance staff, etc.) are likely to be phenomenally   The customer is ideally not involved with the building
                 high.                                                    or maintenance of the cloud infrastructure or
                                                                          services. This feature of abstraction is common to
                                                                          both grid computing and cloud computing.
                 Grid computing does not have universal standards         Cloud computing has a more commercial focus and
                 with regard to configuration of systems and software.    is therefore, more flexible when compared to the grid
                 Some software and most algorithms and codes              model. For example, expansion of a business
                 require major restructuring in order to use all the      requiring more resources is as easy as informing
                 benefits of "parallel processing" available with grid    your provider to avail their seamless and mostly
                 computing.                                               automated expansion services.
 Computing
   Model         Even data communication protocols are grid-specific.     Even writing a new code etc., becomes less time-
                 Since most resources are being shared, network           consuming with the use of generic software.
                 congestion control, fairness in allocation, reduction
                 in latency, etc., are factors governing the              Existing protocols such as Web Services (WSDL,
                 development of grid protocols. Standard protocols        SOAP), and some advanced Web 2.0 technologies
                 are just not agile or flexible to support grid           such as REST, RSS, AJAX, etc., can be utilized in
                 infrastructures.                                         cloud-based systems.
We have already seen that the grid infrastructure           For obvious reasons (relative homogeneity of cloud
            comprises diverse configurations and platforms. Hence,      systems), cloud security models are relatively simpler
            the security for such a system would be a consideration     and less secure than that of grid computing.
            right from the setting up of the grid.
                                                                        It is a matter of mutual understanding where the
            Important factors considered are authentication (single     provider ensures protection of the customer's data
            sign-on), authorization, credential, conversion,            and applications. Private cloud (where the
            auditing, and delegation.                                   infrastructure is dedicated to a single customer) and
Security                                                                community cloud (cloud infrastructure shared between
            Typically, a grid infrastructure has operational            a finite set of multiple customers) are effective ways to
            autonomy which ensures greater security controls and        restrict access to authorized, limited number of users.
            protocols. However, providing a security layer to a grid
            infrastructure is a time-consuming process.                 Cloud infrastructure typically use Web forms (over
                                                                        Secured Sockets Layer (SSL)) to create and manage
                                                                        account information for end-users. Encrypted
                                                                        communications ensure secure identity and password
                                                                        management.
            - Is there a possibility of lesser complexity in building   - Does the cloud provider have a disaster
            grids?                                                      management and recovery mechanism in place to deal
                                                                        with loss of customer's data?
            - Is there a possibility of developing ubiquitous
  Some
            standards for grid infrastructure?                          - Is there a backup/contingency plan in case of
Potential
                                                                        disasters to ensure business continuity?
 Issues
                                                                        - What if the cloud provider exits the business or is
                                                                        acquired by another company, what happens to the
                                                                        customer's data and cloud operations?
            - The European Organization for Nuclear Research            - Salesforce.com, Google App Engine, Microsoft Azure,
            (CERN) is one of the leading organizations running          and Amazon EC2 are famous cloud providers in the
            major grid computing initiatives including analyzing        public domain (they provide services to anyone who
            chemical compounds in the search for potential drugs        needs them over the public Internet).
            for diseases such as avian flu.
Examples                                                                - Other service providers include the open source
            - SETI (Search for Extraterrestrial Intelligence) @Home     AbiCloud, Elastichosts and NASA's Nebula platform.
            project is one of the earliest grid initiatives that
            downloads and analyzes data from radio telescope.
            Participants simply need to download and run a
            program to join the grid network.
From the above discussion of contrasting factors between
grid computing and cloud computing, it is clear that it's not
a simple matter of choosing one over the other.

It seems as though cloud computing is more suited to
businesses looking to derive value out of their IT operations
in a streamlined fashion. The agility that comes with
utilizing services from the cloud complements its scalability.

The grid computing paradigm on the other hand, has been
the traditional arena of funded scientific research although
there are emerging instances of its use in biomedical,
financial and industrial research. It now finds applications in
weather modeling and weapons test simulations.

In fact, web serving (serving requests of website content
from users located all over the world) is an example of a
commercial application that benefits from the grid
infrastructure.

Weitere ähnliche Inhalte

Was ist angesagt?

A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
IJNSA Journal
 
Cloudsecurity
CloudsecurityCloudsecurity
Cloudsecurity
drewz lin
 
Cloud Forensics
Cloud ForensicsCloud Forensics
Cloud Forensics
sdavis532
 

Was ist angesagt? (17)

50120130406006
5012013040600650120130406006
50120130406006
 
zenoh: The Edge Data Fabric
zenoh: The Edge Data Fabriczenoh: The Edge Data Fabric
zenoh: The Edge Data Fabric
 
OMG DDS Tutorial - Part I
OMG DDS Tutorial - Part IOMG DDS Tutorial - Part I
OMG DDS Tutorial - Part I
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Introducing Vortex Lite
Introducing Vortex LiteIntroducing Vortex Lite
Introducing Vortex Lite
 
High Performance Distributed Computing with DDS and Scala
High Performance Distributed Computing with DDS and ScalaHigh Performance Distributed Computing with DDS and Scala
High Performance Distributed Computing with DDS and Scala
 
Micro services Architecture with Vortex -- Part I
Micro services Architecture with Vortex -- Part IMicro services Architecture with Vortex -- Part I
Micro services Architecture with Vortex -- Part I
 
Cloudsecurity
CloudsecurityCloudsecurity
Cloudsecurity
 
Cloud Forensics
Cloud ForensicsCloud Forensics
Cloud Forensics
 
Vortex Tutorial -- Part I
Vortex Tutorial -- Part IVortex Tutorial -- Part I
Vortex Tutorial -- Part I
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sql
 
The DDS Tutorial Part II
The DDS Tutorial Part IIThe DDS Tutorial Part II
The DDS Tutorial Part II
 
25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)
 
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...IRJET-  	  A Novel and Secure Approach to Control and Access Data in Cloud St...
IRJET- A Novel and Secure Approach to Control and Access Data in Cloud St...
 
DDS and OPC UA Explained
DDS and OPC UA ExplainedDDS and OPC UA Explained
DDS and OPC UA Explained
 
489 493
489 493489 493
489 493
 

Andere mochten auch

Alfresco
AlfrescoAlfresco
Alfresco
Victor
 
suzhou tiger hill
suzhou tiger hillsuzhou tiger hill
suzhou tiger hill
s10021
 
Sense títol 1
Sense títol 1Sense títol 1
Sense títol 1
Victor
 
Alfresco
AlfrescoAlfresco
Alfresco
Victor
 
Alfresco
AlfrescoAlfresco
Alfresco
Victor
 
Alfresco
AlfrescoAlfresco
Alfresco
Victor
 

Andere mochten auch (13)

Un paseo por el Mundo
Un paseo por el MundoUn paseo por el Mundo
Un paseo por el Mundo
 
Alfresco
AlfrescoAlfresco
Alfresco
 
suzhou tiger hill
suzhou tiger hillsuzhou tiger hill
suzhou tiger hill
 
Grid security seminar mohit modi
Grid security seminar mohit modiGrid security seminar mohit modi
Grid security seminar mohit modi
 
Sense títol 1
Sense títol 1Sense títol 1
Sense títol 1
 
Activitat 4
Activitat 4Activitat 4
Activitat 4
 
Alfresco
AlfrescoAlfresco
Alfresco
 
Alfresco
AlfrescoAlfresco
Alfresco
 
Farm book
Farm bookFarm book
Farm book
 
It presentation
It presentationIt presentation
It presentation
 
Alfresco
AlfrescoAlfresco
Alfresco
 
Flickrpowerpoint3
Flickrpowerpoint3Flickrpowerpoint3
Flickrpowerpoint3
 
Flickrpowerpoint2
Flickrpowerpoint2Flickrpowerpoint2
Flickrpowerpoint2
 

Ähnlich wie Mohit seminar gs.cse2012

Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
eSAT Journals
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
Shakas Technologies
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
 

Ähnlich wie Mohit seminar gs.cse2012 (20)

Reshma.docx
Reshma.docxReshma.docx
Reshma.docx
 
Comparison of data security in grid and cloud
Comparison of data security in grid and cloudComparison of data security in grid and cloud
Comparison of data security in grid and cloud
 
Comparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computingComparison of data security in grid and cloud computing
Comparison of data security in grid and cloud computing
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
 
It pp hybrid attribute- and re-encryption-based key management for secure and...
It pp hybrid attribute- and re-encryption-based key management for secure and...It pp hybrid attribute- and re-encryption-based key management for secure and...
It pp hybrid attribute- and re-encryption-based key management for secure and...
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
An Improved Integrated Hash and Attributed based Encryption Model on High Dim...
 
ITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment modelITU-T requirement for cloud and cloud deployment model
ITU-T requirement for cloud and cloud deployment model
 
Collaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issuesCollaboration in multicloud computing environments framework and security issues
Collaboration in multicloud computing environments framework and security issues
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing...
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Collaboration in multicloud computing e...
 
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
A Study of A Method To Provide Minimized Bandwidth Consumption Using Regenera...
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databases
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...
Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...
Security Mechanisms for Precious Data Protection of Divergent Heterogeneous G...
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Mohit seminar gs.cse2012

  • 1. Presented By: Mohit Modi (BT08CSE043)
  • 2. The concept of grid computing is not new. In a way, it is nothing but parallel or distributed computing; however, the difference lies in the scale and complexity! So imagine parallel processing at a level where instead of sharing one or more resources, each and every computing resource is shared among all the computers within the network (as if they form an interconnected grid). Now imagine that the grid can consist of several different authorized heterogeneous systems, even owned by different organizations! It would be like a huge supercomputer with unmatched processing power, memory capacity and data storage capacity suitable for the most complex computations, but really it is just a network of interconnected computers. As far as the user of a grid computer is concerned, he/she is just using the local computer (now a supercomputer owing to the grid links) unaware of the links contributing to the power and enormous complexity of the network grid or cluster to which that machine belongs.
  • 3. In order to provide:  ◦ Confidentiality  ◦ Authentication  ◦ Message integrity  ◦ Nonrepudiation  But Grid Security is difficult:  ◦ Use of valuable resources, solving sensitive problems  ◦ Distinct domains (own policies, procedures)  ◦ A single computation might require a large and  unpredictable set of resources  ◦ Broad availability and applicability
  • 4. Motivations:  Secure communication (authentication and  perhaps confidentiality) between elements of  a computational Grid.  Security across organizational boundaries,  thus prohibiting a centrally-managed security  system.  “Single sign-on" for users of the Grid,  including delegation of credentials for  computations that involve multiple resources  and/or sites.
  • 5.
  • 6. Also known as Public Key Infrastructure (PKI).  User (or entity) gets a related key pair:  ◦ A private key - known only to the user.  ◦ A public key – in the public domain.  A message encrypted with one key requires  the other key for decryption.
  • 7. Digitally "sign" a piece of information  using public key cryptography.  To sign a piece of information:  ◦ The sender computes a mathematical hash of the  information.  ◦ Using the private key, he/she encrypts the hash, and attaches  it to the message (the recipient has the public key).  To authenticate the information:  ◦ The recipient computes the hash using the same algorithm.  ◦ Using the public key, he/she decrypts the encrypted hash.  Match? – Then the sender has signed the message  and it is intact.
  • 8. The Certificate - a central concept in GSI  authentication.  It identifies and authenticates every user and  service on the Grid.  A GSI certificate includes four primary pieces of  information:  ◦ A subject name, which identifies the person or object  that the certificate represents.  ◦ The public key belonging to the subject.  ◦ The identity of a Certificate Authority (CA) that has  signed the certificate to certify that the public key and  the identity both belong to the subject.  ◦ The digital signature of the named CA.
  • 9. GSI certificates are encoded in the X.509  certificate format (a standard data format for  certificates established by IETF). This certificate:  ◦ identifies the subject and his/her institution;  ◦ is created for the subject by the subject’s institution.  An X.509 certificate includes:  ◦ subject’s name;  ◦ subject’s public key;  ◦ name of the issuing CA;  ◦ signature of issuing CA;  ◦ validity dates (start and end dates);  ◦ other - version information, etc.
  • 10. At the end, Alice and Bob have established a connection to each other and are certain that they know each other’s identities.
  • 11. GSI does not establish confidential  (encrypted) communication between  parties (by default).  If it is desired, GSI can easily be  used to establish a shared key for  encryption.  Related security feature – communication  integrity.  ◦ Integrity means that an eavesdropper may be able to  read communication between two parties but is not  able to modify the communication in any way.  GSI provides communication integrity by default.
  • 12. Delegation capability in GSI – an extension of the  standard SSL protocol which reduces the number  of times the user must enter his passphrase.  A user needs to re-enter his/her passphrase if:  ◦ several Grid resources are required for a computation;  ◦ agents (local or remote) request services on behalf of a  user;  ◦ etc.  How to avoid this? - Create a proxy.  A proxy consists of a new certificate and a  private key.
  • 13. The new certificate (proxy certificate):  ◦ contains the owner's identity, modified slightly to  indicate that it is a proxy;  ◦ is signed by the owner, rather than a CA.  Proxies have limited lifetimes.  ◦ The proxy certificate includes a time notation after  which the proxy should no longer be accepted by  others.
  • 14. The proxy's private key might be stored in a local  storage system without being encrypted (since  the proxy is not valid for very long).  Mutual authentication when using proxies:  ◦ The remote party receives the proxy's certificate (signed by the owner) and the  owner's certificate.  ◦ The signature on the proxy certificate is validated using the owner's public key  (obtained from his/her certificate).  ◦ The signature on the owner's certificate is validated using the CA's public key.  ◦ A chain of trust from the CA to the proxy through the owner is established.  Single sign-on – used when there are service  requests travelling through multiple security  domains in GSI.  GSI uses proxy certificates for single sign-on and  delegation of rights to other entities.
  • 15. What is really needed is to reduce the amount of work the service has to do to establish authorization, without doing so by looking up the actual person. This is the sort of task that has been given to RBAC mechanisms. However the traditional view of people being given roles does not work very well in the grid either. The main issues are that it is very difficult to give people meaningful roles, and people understand different things by those roles. They do however make authorization much simpler as you are only checking whether a certain role can use a service.
  • 16.
  • 17.
  • 18. Grid Computing Cloud Computing Typically, grid infrastructures are accessed by A customer accessing a cloud infrastructure or multiple, heterogeneous organizations or project service will pay the cloud provider on a pay-per-use teams that typically share a common goal and need basis. The business model relies on optimizing access to a virtual supercomputer to work on a single utilization such that the cost makes sense for the task or a single set of tasks. However, the users or customer as well as brings profits to the provider. project sponsors would have to bear the enormous cost of setting up and maintaining and monitoring We can perhaps associate it to the use of utilities the grid. such as electricity, gas, etc., or purchasing in bulk, Business Model but only when there's a requirement or demand. The When compared to accessing a cloud infrastructure benefit is in achieving economies of scale. It's that charges only as per consumption of resources, independent of whether the task requires the set-up costs of a grid along with the cost of computational power or increased storage capacity. ownership of resources (like network administration, maintenance staff, etc.) are likely to be phenomenally The customer is ideally not involved with the building high. or maintenance of the cloud infrastructure or services. This feature of abstraction is common to both grid computing and cloud computing. Grid computing does not have universal standards Cloud computing has a more commercial focus and with regard to configuration of systems and software. is therefore, more flexible when compared to the grid Some software and most algorithms and codes model. For example, expansion of a business require major restructuring in order to use all the requiring more resources is as easy as informing benefits of "parallel processing" available with grid your provider to avail their seamless and mostly computing. automated expansion services. Computing Model Even data communication protocols are grid-specific. Even writing a new code etc., becomes less time- Since most resources are being shared, network consuming with the use of generic software. congestion control, fairness in allocation, reduction in latency, etc., are factors governing the Existing protocols such as Web Services (WSDL, development of grid protocols. Standard protocols SOAP), and some advanced Web 2.0 technologies are just not agile or flexible to support grid such as REST, RSS, AJAX, etc., can be utilized in infrastructures. cloud-based systems.
  • 19. We have already seen that the grid infrastructure For obvious reasons (relative homogeneity of cloud comprises diverse configurations and platforms. Hence, systems), cloud security models are relatively simpler the security for such a system would be a consideration and less secure than that of grid computing. right from the setting up of the grid. It is a matter of mutual understanding where the Important factors considered are authentication (single provider ensures protection of the customer's data sign-on), authorization, credential, conversion, and applications. Private cloud (where the auditing, and delegation. infrastructure is dedicated to a single customer) and Security community cloud (cloud infrastructure shared between Typically, a grid infrastructure has operational a finite set of multiple customers) are effective ways to autonomy which ensures greater security controls and restrict access to authorized, limited number of users. protocols. However, providing a security layer to a grid infrastructure is a time-consuming process. Cloud infrastructure typically use Web forms (over Secured Sockets Layer (SSL)) to create and manage account information for end-users. Encrypted communications ensure secure identity and password management. - Is there a possibility of lesser complexity in building - Does the cloud provider have a disaster grids? management and recovery mechanism in place to deal with loss of customer's data? - Is there a possibility of developing ubiquitous Some standards for grid infrastructure? - Is there a backup/contingency plan in case of Potential disasters to ensure business continuity? Issues - What if the cloud provider exits the business or is acquired by another company, what happens to the customer's data and cloud operations? - The European Organization for Nuclear Research - Salesforce.com, Google App Engine, Microsoft Azure, (CERN) is one of the leading organizations running and Amazon EC2 are famous cloud providers in the major grid computing initiatives including analyzing public domain (they provide services to anyone who chemical compounds in the search for potential drugs needs them over the public Internet). for diseases such as avian flu. Examples - Other service providers include the open source - SETI (Search for Extraterrestrial Intelligence) @Home AbiCloud, Elastichosts and NASA's Nebula platform. project is one of the earliest grid initiatives that downloads and analyzes data from radio telescope. Participants simply need to download and run a program to join the grid network.
  • 20. From the above discussion of contrasting factors between grid computing and cloud computing, it is clear that it's not a simple matter of choosing one over the other. It seems as though cloud computing is more suited to businesses looking to derive value out of their IT operations in a streamlined fashion. The agility that comes with utilizing services from the cloud complements its scalability. The grid computing paradigm on the other hand, has been the traditional arena of funded scientific research although there are emerging instances of its use in biomedical, financial and industrial research. It now finds applications in weather modeling and weapons test simulations. In fact, web serving (serving requests of website content from users located all over the world) is an example of a commercial application that benefits from the grid infrastructure.