Repositório Seguro de Aplicações Baseado em GSS

  • Jose de R. B. Pinheiro Júnior USP
  • Alexandre César Tavares Vidal USP
  • Fabio Kon USP

Abstract


Security is a key concept in distributed systems; in Opportunistic Grid Computing, resources, applications, and user data must be protected. This article describes the implementation of the InteGrade secure application repository. First, we present some important security-related issues in Grid Computing and how they are addressed in InteGrade. Next, we describe the InteGrade architecture and explain the implementation of the security protocols for the application repository. Finally, we show some experimental results on the performance of the proposed implementation, and discuss ongoing and future work.

References

Andrade, N., Costa, L., Germóglio, G., and Cirne, W. (2005). Peer-to-peer grid computing with the ourgrid community. In SBRC 2005 IV Salão de Ferramentas, pages 1191-1198. Simpósio Brasileiro de Redes de Computadores (SBRC).

Berman, F., Fox, G., Hey, A. J. G., and Hey, T. (2003). Grid Computing: Making the Global Infrastructure a Reality. John Wiley & Sons, Inc.

Cirne, W., Paranhos, D., Costa, L., Santos-Neto, E., Brasileiro, F., Sauvé, J., Silva, F. A. B., Barros, C. O., and Silveira, C. (2003). Running Bag-of-Tasks Applications on Computational Grids: The MyGrid Approach. In Proceedings of the 2003 International Conference on Parallel Processing, pages 407-416.

de Camargo, R. Y., Goldchleger, A., Carneiro, M., and Kon, F. (2004). Grid: An Architectural Pattern. In The 11th Conference on Pattern Languages of Programs (PLoP'2004), Monticello, Illinois, USA.

Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Bell, S., and Ylonen, T. (1999). SPKI Certificate Theory. Internet RFC 2693.

Ford, W. (1994). Computer communications security: principles, standard protocols and techniques. Prentice-Hall, Inc., Upper Saddle River, NJ, USA.

Foster, I. and Kesselman, C. (1997). Globus: A Metacomputing Infrastructure Toolkit. International Journal of Supercomputer Applications, 2(11):115-128.

Foster, I. and Kesselman, C. (2003). The Grid 2: Blueprint for a New Computing Infrastructure. Morgan Kaufmann Publishers Inc.

Garfinkel, S. and Spafford, G. (1996). Practical UNIX & Internet Security. O Reilly & Associates, Inc.

Goldchleger, A., Kon, F., Goldman, A., Finger, M., and Bezerra, G. C. (2004). InteGrade: object-oriented Grid middleware leveraging the idle computing power of desktop machines. Concurrency and Computation: Practice and Experience, 16(5):449-459.

Grimshaw, A. S., Wulf, W. A., and Team, T. L. (1997). The Legion Vision of a Worldwide Virtual Computer. Communications of the ACM, 40(1):39-45.

Livny, M., Basney, J., Raman, R., and Tannenbaum, T. (1997). Mechanisms for High Throughput Computing. SPEEDUP Journal, 11(1).
Published
2005-09-26
PINHEIRO JÚNIOR, Jose de R. B.; VIDAL, Alexandre César Tavares; KON, Fabio. Repositório Seguro de Aplicações Baseado em GSS. In: BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 5. , 2005, Florianópolis. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2005 . p. 271-274. DOI: https://doi.org/10.5753/sbseg.2005.21550.