Cargando…
A Mediated Definite Delegation Model allowing for Certified Grid Job Submission
Grid computing infrastructures need to provide traceability and accounting of their users" activity and protection against misuse and privilege escalation. A central aspect of multi-user Grid job environments is the necessary delegation of privileges in the course of a job submission. With resp...
Autores principales: | , , , |
---|---|
Lenguaje: | eng |
Publicado: |
2011
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1406564 |
_version_ | 1780923780382588928 |
---|---|
author | Schreiner, Steffen Betev, Latchezar Grigoras, Costin Litmaath, Maarten |
author_facet | Schreiner, Steffen Betev, Latchezar Grigoras, Costin Litmaath, Maarten |
author_sort | Schreiner, Steffen |
collection | CERN |
description | Grid computing infrastructures need to provide traceability and accounting of their users" activity and protection against misuse and privilege escalation. A central aspect of multi-user Grid job environments is the necessary delegation of privileges in the course of a job submission. With respect to these generic requirements this document describes an improved handling of multi-user Grid jobs in the ALICE ("A Large Ion Collider Experiment") Grid Services. A security analysis of the ALICE Grid job model is presented with derived security objectives, followed by a discussion of existing approaches of unrestricted delegation based on X.509 proxy certificates and the Grid middleware gLExec. Unrestricted delegation has severe security consequences and limitations, most importantly allowing for identity theft and forgery of delegated assignments. These limitations are discussed and formulated, both in general and with respect to an adoption in line with multi-user Grid jobs. Based on the architecture of the ALICE Grid Services, a new general model of mediated definite delegation is developed and formulated, allowing a broker to assign context-sensitive user privileges to agents. The model provides strong accountability and long- term traceability. A prototype implementation allowing for certified Grid jobs is presented including a potential interaction with gLExec. The achieved improvements regarding system security, malicious job exploitation, identity protection, and accountability are emphasized, followed by a discussion of non- repudiation in the face of malicious Grid jobs. |
id | cern-1406564 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2011 |
record_format | invenio |
spelling | cern-14065642023-03-15T19:12:33Zhttp://cds.cern.ch/record/1406564engSchreiner, SteffenBetev, LatchezarGrigoras, CostinLitmaath, MaartenA Mediated Definite Delegation Model allowing for Certified Grid Job SubmissionComputing and ComputersGrid computing infrastructures need to provide traceability and accounting of their users" activity and protection against misuse and privilege escalation. A central aspect of multi-user Grid job environments is the necessary delegation of privileges in the course of a job submission. With respect to these generic requirements this document describes an improved handling of multi-user Grid jobs in the ALICE ("A Large Ion Collider Experiment") Grid Services. A security analysis of the ALICE Grid job model is presented with derived security objectives, followed by a discussion of existing approaches of unrestricted delegation based on X.509 proxy certificates and the Grid middleware gLExec. Unrestricted delegation has severe security consequences and limitations, most importantly allowing for identity theft and forgery of delegated assignments. These limitations are discussed and formulated, both in general and with respect to an adoption in line with multi-user Grid jobs. Based on the architecture of the ALICE Grid Services, a new general model of mediated definite delegation is developed and formulated, allowing a broker to assign context-sensitive user privileges to agents. The model provides strong accountability and long- term traceability. A prototype implementation allowing for certified Grid jobs is presented including a potential interaction with gLExec. The achieved improvements regarding system security, malicious job exploitation, identity protection, and accountability are emphasized, followed by a discussion of non- repudiation in the face of malicious Grid jobs.Grid computing infrastructures need to provide traceability and accounting of their users' activity and protection against misuse and privilege escalation. A central aspect of multi-user Grid job environments is the necessary delegation of privileges in the course of a job submission. With respect to these generic requirements this document describes an improved handling of multi-user Grid jobs in the ALICE ('A Large Ion Collider Experiment') Grid Services. A security analysis of the ALICE Grid job model is presented with derived security objectives, followed by a discussion of existing approaches of unrestricted delegation based on X.509 proxy certificates and the Grid middleware gLExec. Unrestricted delegation has severe security consequences and limitations, most importantly allowing for identity theft and forgery of delegated assignments. These limitations are discussed and formulated, both in general and with respect to an adoption in line with multi-user Grid jobs. Based on the architecture of the ALICE Grid Services, a new general model of mediated definite delegation is developed and formulated, allowing a broker to assign context-sensitive user privileges to agents. The model provides strong accountability and long- term traceability. A prototype implementation allowing for certified Grid jobs is presented including a potential interaction with gLExec. The achieved improvements regarding system security, malicious job exploitation, identity protection, and accountability are emphasized, followed by a discussion of non- repudiation in the face of malicious Grid jobs.arXiv:1112.2444oai:cds.cern.ch:14065642011-12-13 |
spellingShingle | Computing and Computers Schreiner, Steffen Betev, Latchezar Grigoras, Costin Litmaath, Maarten A Mediated Definite Delegation Model allowing for Certified Grid Job Submission |
title | A Mediated Definite Delegation Model allowing for Certified Grid Job Submission |
title_full | A Mediated Definite Delegation Model allowing for Certified Grid Job Submission |
title_fullStr | A Mediated Definite Delegation Model allowing for Certified Grid Job Submission |
title_full_unstemmed | A Mediated Definite Delegation Model allowing for Certified Grid Job Submission |
title_short | A Mediated Definite Delegation Model allowing for Certified Grid Job Submission |
title_sort | mediated definite delegation model allowing for certified grid job submission |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1406564 |
work_keys_str_mv | AT schreinersteffen amediateddefinitedelegationmodelallowingforcertifiedgridjobsubmission AT betevlatchezar amediateddefinitedelegationmodelallowingforcertifiedgridjobsubmission AT grigorascostin amediateddefinitedelegationmodelallowingforcertifiedgridjobsubmission AT litmaathmaarten amediateddefinitedelegationmodelallowingforcertifiedgridjobsubmission AT schreinersteffen mediateddefinitedelegationmodelallowingforcertifiedgridjobsubmission AT betevlatchezar mediateddefinitedelegationmodelallowingforcertifiedgridjobsubmission AT grigorascostin mediateddefinitedelegationmodelallowingforcertifiedgridjobsubmission AT litmaathmaarten mediateddefinitedelegationmodelallowingforcertifiedgridjobsubmission |