Cargando…

An efficient method for fine-grained access authorization in distributed

The ARDA group has developed an efficient method for fine-grained access authorization in distributed (Grid) storage systems. Client applications obtain "access tokens" from an organization's file catalogue upon execution of a file name resolution request. Whenever a client applicatio...

Descripción completa

Detalles Bibliográficos
Autor principal: Peters, Andreas
Lenguaje:eng
Publicado: 2006
Materias:
Acceso en línea:http://cds.cern.ch/record/1120624
_version_ 1780914562741043200
author Peters, Andreas
author_facet Peters, Andreas
author_sort Peters, Andreas
collection CERN
description The ARDA group has developed an efficient method for fine-grained access authorization in distributed (Grid) storage systems. Client applications obtain "access tokens" from an organization's file catalogue upon execution of a file name resolution request. Whenever a client application tries to access the requested files, the token is transparently passed to the target storage system. Thus the storage service can decide on the authorization of a request without itself having to contact the authorization service. The token is protected from access and modification by external parties using public key infrastructure. We use GSI authentication for identification to the catalogue service and to storage I/O daemons. The authorization system is as secure as GSI authentication and public key infrastructure can be. To improve the performance for the catalogue interaction, we use GSI authenticated sessions between client and server: after an initial full GSI authentication we encrypt every interaction between client and server with a dynamic symmetric key and achieve a 20 times faster performance. The main information inside an authorization envelope are the TURL to be used by I/O daemons, the permissions on that TURL, which are 'read','write','write-once' and 'delete', the lifetime of that token, the certificate subject and the storage system name for which this token was issued. One token can contain the authorization for a group of files. Traditional approaches use proxy->uid mapping services to apply local filesystem permissions. In a direct comparison an access token is equivalent to a VOMS proxy certificate who's proxy extensions authorize access to only one file or a group of files. However VOMS is not the appropriate system to perform authorization on file level since the issue time for such an envelope is very critical (in our implementation only few ms per access) and the VOMS integration, a VOMS server would need to be directly connected to the used file ca
id cern-1120624
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2006
record_format invenio
spelling cern-11206242019-09-30T06:29:59Zhttp://cds.cern.ch/record/1120624engPeters, AndreasAn efficient method for fine-grained access authorization in distributedComputing and ComputersThe ARDA group has developed an efficient method for fine-grained access authorization in distributed (Grid) storage systems. Client applications obtain "access tokens" from an organization's file catalogue upon execution of a file name resolution request. Whenever a client application tries to access the requested files, the token is transparently passed to the target storage system. Thus the storage service can decide on the authorization of a request without itself having to contact the authorization service. The token is protected from access and modification by external parties using public key infrastructure. We use GSI authentication for identification to the catalogue service and to storage I/O daemons. The authorization system is as secure as GSI authentication and public key infrastructure can be. To improve the performance for the catalogue interaction, we use GSI authenticated sessions between client and server: after an initial full GSI authentication we encrypt every interaction between client and server with a dynamic symmetric key and achieve a 20 times faster performance. The main information inside an authorization envelope are the TURL to be used by I/O daemons, the permissions on that TURL, which are 'read','write','write-once' and 'delete', the lifetime of that token, the certificate subject and the storage system name for which this token was issued. One token can contain the authorization for a group of files. Traditional approaches use proxy->uid mapping services to apply local filesystem permissions. In a direct comparison an access token is equivalent to a VOMS proxy certificate who's proxy extensions authorize access to only one file or a group of files. However VOMS is not the appropriate system to perform authorization on file level since the issue time for such an envelope is very critical (in our implementation only few ms per access) and the VOMS integration, a VOMS server would need to be directly connected to the used file caoai:cds.cern.ch:11206242006
spellingShingle Computing and Computers
Peters, Andreas
An efficient method for fine-grained access authorization in distributed
title An efficient method for fine-grained access authorization in distributed
title_full An efficient method for fine-grained access authorization in distributed
title_fullStr An efficient method for fine-grained access authorization in distributed
title_full_unstemmed An efficient method for fine-grained access authorization in distributed
title_short An efficient method for fine-grained access authorization in distributed
title_sort efficient method for fine-grained access authorization in distributed
topic Computing and Computers
url http://cds.cern.ch/record/1120624
work_keys_str_mv AT petersandreas anefficientmethodforfinegrainedaccessauthorizationindistributed
AT petersandreas efficientmethodforfinegrainedaccessauthorizationindistributed