Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 336 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
336
Dung lượng
8,04 MB
Nội dung
[...]... technologies will be required to understand the chapters covering advanced security issues in gridcomputing The book has a brief and concise background on gridcomputingsecurity which would be used in explaining the specific issues of gridcomputingsecurity in later chapters A small primer on Web services security and gridcomputing standards like OGSA is also provided in the appendix for readers... into gridsecurity issues, challenges, and solutions 1.3 About the Book This book aims at generating awareness regarding the different issues of security among the researchers and practitioners of gridcomputing The book does not assume that the reader is an expert in security or gridcomputing technologies However, some prior knowledge about general security 12 1 Introduction principles and/or grid computing. .. overview of generic security technologies which are useful in the area of gridcomputing also Chapter 3 provides a taxonomy of all the issues and a solution sketch The chapter gives readers a high-level view of the gridsecurity area and the scope therein Chapters 4 to 11 talk about issues and solutions pertaining to the different components of gridcomputingsecurityGridcomputingsecurity issues can... the evolution of grid computing, its benefits, and concerns 1.2 Grid Computing Overview One of the earliest proponents of grid technology is Ian Foster of the Argonne National Laboratory and professor at the University of Chicago In 1998, in a book called The Grid: Blueprint for a New Computing Infrastructure co-authored with Carl Kesselman, Foster defined the grid as “A computational grid is a hardware... have a grid strategy also have their own definitions Oracle® described its vision of the grid as an adaptive software infrastructure which is able to balance resources efficiently through the usage of low cost servers and storage [15] Sun ® Microsystems, meanwhile, breaks the grid down into three levels: cluster grids, enterprise grids, and global grids While cluster grids are the simplest form of grid. .. working on grid computing security would be able to get all the information about the different aspects in a single place The book will also provide pointers for further research directions which will benefit students who are looking for potential research areas Experienced researchers in the field of grid computing will be able to get a comprehensive overview of different security issues in grid computing. .. promise of gridcomputing goes beyond that and the next few years should see a gradual adoption of the 1.2 GridComputing Overview 3 grid as a natural choice among the other enterprises However, the widespread adoption of gridcomputing as an automatic choice in enterprises depends upon the ability of the researchers and practitioners in reducing the pitfalls that lie on the way One such pitfall is security. .. more flexible model for the grid system Sun® Microsystems have come forward with their vision of charging the users 1$ for using the grid resources With the growth of Grid systems, we would probably see the emergence of a flexible licensing and pricing model in the line of transport business GridSecurity Lastly, we come to the issue of security In addition to the typical security challenges like authentication,... xii Contents 8 Grid Network Security 159 8.1 Introduction 159 8.1.1 Grid Network Security Issues 159 8.2 Firewalls 161 8.2.1 Different Types of Firewalls 163 8.2.2 Firewalls and Grid – Issues 165 8.2.3 Firewalls and Web Services 167 8.3 Virtual Private Networks (VPN) 168 8.3.1 VPNs and Grid – Types of VPNs 169 8.3.2 VPNs and Grid – Issues... shared, the enterprise grid takes a broader picture, where the resources within an enterprise are shared Global grids, on the other hand, talk about a grid across enterprises sharing resources [16] HP® tends to talk more about utility computing – its own take on the grid concept – while IBM® talks about grid technology in the same breath as its vision for what it calls autonomic computing [17] According . vii 1 Introduction 1 1.1 Background 1 1.2 Grid Computing Overview 3 1.2.1 Evolution of Grid Computing 4 1.2.2 Benefits of Grid Computing 6 1.2.3 Grid Computing Issues and Concerns 8 1.3 About. on the is- sue related to grid computing security. As an issue, security is perhaps the most important and needs close understanding as grid computing offers unique security challenges. In. x0 y0 w1 h0" alt="" Grid Computing Security 123 Anirban Chakrabarti Grid With 87 Figures and 12 Tables Computing Security Library of Congress Control Number: 2007922355 ACM Computing Classification