Abstract
Computational Grids (or simply Grids) enable access to a large number of resources typically including processing, memory, and storage devices. Usually, Grids are used for running very specific applications (most of them related to some kind of scientific hard problem); however, not much attention has been paid to commercial Grid applications. The massive use of such commercial services will depend on fulfilling their special security, usability and quality of service requirements. In this sense, Virtual Private Grid (VPG) provides a way of dynamically create a virtual grid environment with dedicated network resources. In this paper VPG is compared with related work such as the Grid over VPN (GoVPN), the Grid Community (GC) and the Ad-hoc Grid (AG) and the security challenges for VPGs are analyzed.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Ballenson, D., McGrew, D., Sherman, A.: Key Management for Large Dynamic Groups: OneWay Function Trees and Amortized Initialization. Internet Draft (2000) (work in progress)
Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: A taxonomy and some efficient constructions. In: INFOCOMM 1999 (1999)
Figueiredo, R., Dinda, P., Fortes, J.: A case for grid computing on virtual machines. In: International Conference on Distributed Computing Systems (ICDCS), May 2003, pp. 550–559. IEEE Computer Society, Los Alamitos (2003)
Figueiredo, R.J.: Vp/gfs: an architecture for virtual private grid file systems. Technical Report TR-ACIS-03-001, University of Florida (May 2003)
Foster, I., Kesselman, C.: The Grid. Blueprint for a new computing infrastructure. Morgan Kaufmann, San Francisco (1999)
Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the Grid. International Journal of Supercomputer Applications 15(3), 200–222 (2001)
Foster, I.T., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for computational grids. In: ACM Conference on Computer and Communications Security, pp. 83–92 (1998)
Harney, H., Harder, E.: Logical Key Hierarchy Protocol (1999) Internet Draft (work in progress)
Kaneda, K., Taura, K., Yonezawa, A.: Virtual private grid: a command shell for utilizing hundreds of machines efficiently. Future Generation Computer Systems 19(4), 563–573 (2003)
Lorch, M., Kafura, D.: Supporting secure ad-hoc user collaboration in grid environments. In: Parashar, M. (ed.) GRID 2002. LNCS, vol. 2536, pp. 181–193. Springer, Heidelberg (2002)
Pearlman, L., Welch, V., Foster, I., Kesselman, C.: A community authorization service for group collaboration. In: IEEE Third International Workshop on Policies for Distributed Systems and Networks, June 2002, pp. 50–59 (2002)
Pegueroles, J., Bin, W., Soriano, M., Rico-Novella, F.: Group rekeying algorithm using pseudo-random functions and modular reduction. In: Li, M., Sun, X.-H., Deng, Q.-n., Ni, J. (eds.) GCC 2003. LNCS, vol. 3032, pp. 875–882. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Muñoz, J.L., Pegueroles, J., Forné, J., Esparza, O., Soriano, M. (2004). Security Issues in Virtual Grid Environments. In: Bubak, M., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds) Computational Science - ICCS 2004. ICCS 2004. Lecture Notes in Computer Science, vol 3038. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24688-6_25
Download citation
DOI: https://doi.org/10.1007/978-3-540-24688-6_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22116-6
Online ISBN: 978-3-540-24688-6
eBook Packages: Springer Book Archive