Title
Grid Security: Lessons for Peer-to-Peer Systems
Abstract
The vision of the Grid is to provide a computational infrastructure supporting flexible, secure, coordinated resource sharing among dynamic collections of individuals, institutions, and resources [1]. Interest in the Grid has increased as major science programmes look to Grid technology to provide for their computing needs. This has led to substantial investment in the Grid by vendors and governments, notably through the UK e-Science programme and similar programmes in other nations, and more recently at European level. As a result, far more people are joining the effort to develop Grid infrastructure and applications.The Grid by its nature involves access to computer systems and data outside one's own company or institution. Security is therefore a major element in any Grid infrastructure, as it is necessary to ensure that only authorised access is permitted. However, early developments of the Grid were strongly motivated by the performance benefits of sharing resources, and Grid security models were designed not to interfere with this. We show by comparison with mainstream e-Commerce experience that early Grid security models exhibit several weaknesses [2].The early development of the Grid also largely failed to take account of operational realities such as network administrator responsibilities and network devices such as firewalls. Early Grid systems were simply not operable outside academic institutions and closed research networks, and we contend that the most common strategy for making them work "in the real world" represents a short-term fix that is likely to produce conflict between users and application developers on the one hand, and those responsible for network administrationand security on the other. We believe that the peer-to-peer community is also likely to face similar conflicts between its decentralised management approach and the day-to-day concerns of those entrusted to maintain our security.IT Innovation is playing a leading role in the UK E-Science Programme and the exploitation of Grids for industrial and commercial purposes in the European Framework programmes. We have found it necessary to propose and begin development of radical solutions to some of these problems, including "proxy-free" delegation models and semantically-aware firewalls.
Year
DOI
Venue
2003
10.1109/PTP.2003.1231493
Peer-to-Peer Computing
Keywords
Field
DocType
grid technology,network administrationand security,peer-to-peer systems,grid security,early grid system,grid infrastructure,early grid security model,computational infrastructure,uk e-science programme,early development,closed research network,grid security model,grid computing,public key cryptography,authorisation,resource sharing
Internet privacy,Grid computing,Peer-to-peer,Computer security,Computer science,Networking hardware,Computer network,Network administrator,Distributed computing,Semantic grid,Shared resource,Delegation,Grid
Conference
ISBN
Citations 
PageRank 
0-7695-2023-5
9
0.81
References 
Authors
3
2
Name
Order
Citations
PageRank
Mike Surridge124531.19
Colin Upstill2113.47