Cargando…

A Mediated Definite Delegation Model allowing for Certified Grid Job Submission

Grid computing infrastructures need to provide traceability and accounting of their users" activity and protection against misuse and privilege escalation. A central aspect of multi-user Grid job environments is the necessary delegation of privileges in the course of a job submission. With resp...

Descripción completa

Detalles Bibliográficos
Autores principales: Schreiner, Steffen, Betev, Latchezar, Grigoras, Costin, Litmaath, Maarten
Lenguaje:eng
Publicado: 2011
Materias:
Acceso en línea:http://cds.cern.ch/record/1406564
_version_ 1780923780382588928
author Schreiner, Steffen
Betev, Latchezar
Grigoras, Costin
Litmaath, Maarten
author_facet Schreiner, Steffen
Betev, Latchezar
Grigoras, Costin
Litmaath, Maarten
author_sort Schreiner, Steffen
collection CERN
description Grid computing infrastructures need to provide traceability and accounting of their users" activity and protection against misuse and privilege escalation. A central aspect of multi-user Grid job environments is the necessary delegation of privileges in the course of a job submission. With respect to these generic requirements this document describes an improved handling of multi-user Grid jobs in the ALICE ("A Large Ion Collider Experiment") Grid Services. A security analysis of the ALICE Grid job model is presented with derived security objectives, followed by a discussion of existing approaches of unrestricted delegation based on X.509 proxy certificates and the Grid middleware gLExec. Unrestricted delegation has severe security consequences and limitations, most importantly allowing for identity theft and forgery of delegated assignments. These limitations are discussed and formulated, both in general and with respect to an adoption in line with multi-user Grid jobs. Based on the architecture of the ALICE Grid Services, a new general model of mediated definite delegation is developed and formulated, allowing a broker to assign context-sensitive user privileges to agents. The model provides strong accountability and long- term traceability. A prototype implementation allowing for certified Grid jobs is presented including a potential interaction with gLExec. The achieved improvements regarding system security, malicious job exploitation, identity protection, and accountability are emphasized, followed by a discussion of non- repudiation in the face of malicious Grid jobs.
id cern-1406564
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2011
record_format invenio
spelling cern-14065642023-03-15T19:12:33Zhttp://cds.cern.ch/record/1406564engSchreiner, SteffenBetev, LatchezarGrigoras, CostinLitmaath, MaartenA Mediated Definite Delegation Model allowing for Certified Grid Job SubmissionComputing and ComputersGrid computing infrastructures need to provide traceability and accounting of their users" activity and protection against misuse and privilege escalation. A central aspect of multi-user Grid job environments is the necessary delegation of privileges in the course of a job submission. With respect to these generic requirements this document describes an improved handling of multi-user Grid jobs in the ALICE ("A Large Ion Collider Experiment") Grid Services. A security analysis of the ALICE Grid job model is presented with derived security objectives, followed by a discussion of existing approaches of unrestricted delegation based on X.509 proxy certificates and the Grid middleware gLExec. Unrestricted delegation has severe security consequences and limitations, most importantly allowing for identity theft and forgery of delegated assignments. These limitations are discussed and formulated, both in general and with respect to an adoption in line with multi-user Grid jobs. Based on the architecture of the ALICE Grid Services, a new general model of mediated definite delegation is developed and formulated, allowing a broker to assign context-sensitive user privileges to agents. The model provides strong accountability and long- term traceability. A prototype implementation allowing for certified Grid jobs is presented including a potential interaction with gLExec. The achieved improvements regarding system security, malicious job exploitation, identity protection, and accountability are emphasized, followed by a discussion of non- repudiation in the face of malicious Grid jobs.Grid computing infrastructures need to provide traceability and accounting of their users' activity and protection against misuse and privilege escalation. A central aspect of multi-user Grid job environments is the necessary delegation of privileges in the course of a job submission. With respect to these generic requirements this document describes an improved handling of multi-user Grid jobs in the ALICE ('A Large Ion Collider Experiment') Grid Services. A security analysis of the ALICE Grid job model is presented with derived security objectives, followed by a discussion of existing approaches of unrestricted delegation based on X.509 proxy certificates and the Grid middleware gLExec. Unrestricted delegation has severe security consequences and limitations, most importantly allowing for identity theft and forgery of delegated assignments. These limitations are discussed and formulated, both in general and with respect to an adoption in line with multi-user Grid jobs. Based on the architecture of the ALICE Grid Services, a new general model of mediated definite delegation is developed and formulated, allowing a broker to assign context-sensitive user privileges to agents. The model provides strong accountability and long- term traceability. A prototype implementation allowing for certified Grid jobs is presented including a potential interaction with gLExec. The achieved improvements regarding system security, malicious job exploitation, identity protection, and accountability are emphasized, followed by a discussion of non- repudiation in the face of malicious Grid jobs.arXiv:1112.2444oai:cds.cern.ch:14065642011-12-13
spellingShingle Computing and Computers
Schreiner, Steffen
Betev, Latchezar
Grigoras, Costin
Litmaath, Maarten
A Mediated Definite Delegation Model allowing for Certified Grid Job Submission
title A Mediated Definite Delegation Model allowing for Certified Grid Job Submission
title_full A Mediated Definite Delegation Model allowing for Certified Grid Job Submission
title_fullStr A Mediated Definite Delegation Model allowing for Certified Grid Job Submission
title_full_unstemmed A Mediated Definite Delegation Model allowing for Certified Grid Job Submission
title_short A Mediated Definite Delegation Model allowing for Certified Grid Job Submission
title_sort mediated definite delegation model allowing for certified grid job submission
topic Computing and Computers
url http://cds.cern.ch/record/1406564
work_keys_str_mv AT schreinersteffen amediateddefinitedelegationmodelallowingforcertifiedgridjobsubmission
AT betevlatchezar amediateddefinitedelegationmodelallowingforcertifiedgridjobsubmission
AT grigorascostin amediateddefinitedelegationmodelallowingforcertifiedgridjobsubmission
AT litmaathmaarten amediateddefinitedelegationmodelallowingforcertifiedgridjobsubmission
AT schreinersteffen mediateddefinitedelegationmodelallowingforcertifiedgridjobsubmission
AT betevlatchezar mediateddefinitedelegationmodelallowingforcertifiedgridjobsubmission
AT grigorascostin mediateddefinitedelegationmodelallowingforcertifiedgridjobsubmission
AT litmaathmaarten mediateddefinitedelegationmodelallowingforcertifiedgridjobsubmission