Browse > Article

An Integrated Access Control for Sharing of E-Science Grid Resources  

Jung, Im-Y. (서울대학교 컴퓨터공학부)
Jung, Eun-Jin (Univ. of Iowa 컴퓨터사이언스)
Yeom, Heon-Y. (서울대학교 컴퓨터공학부)
Abstract
This paper proposes a light-weight, seamless integrated access control for global e-Science resource sharing. E-Science, based on Grid Computing, was designed to help scientists to remotely control and process the Grid resources such as high-end equipments and remote machines. As many researchers engage in the e-Science Grids, the researchers in a grid often have to wait for or give up use of the Grid resources, even when there are idle resources in other Grids. In this case, provided that proper compensation is given, Grid resource sharing is helpful both for the researchers and the Grids which provide their resources. But, sharing Grid resources globally is not simple, as each e-Science Grid is especially designed for resource sharing in its Virtual Organization(VO) and already has its unique access control policy for its resources. This paper proposes a new integrated access control for e-Science Grid resource sharing. The access control is light-weight without any priori service level agreement(SLA)s among the Grids which share their resources and seamless because the users can use the resources shared as the ones belonging to their Grids without their additional registration to the other Grids.
Keywords
e-Science Grid; Grid resource sharing; an integrated access control for Grid resource sharing;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Gnutella Protocol, http://www9.limewire.com/developer/gnutella_protocol_0.4.pdf
2 D Ferraiolo, J Cugini, DR Kuhn, "Role based access control : features and motivations," ACM Transactions on Information and System Security (TISSEC), 1995
3 "CatNet Project," http://research.ac.upc.edu/catnet/
4 Belokosztolszki, A. and Moody, K., "Meta-Policies for Distributed Role-Based Access Control Systems," Third International Workshop on Policies for Distributed Systems and Networks, 2002
5 Japan NAREGI project, http://www.naregi.org
6 ARM 1300s, 기초과학지원연구원 소속, http://www. kbsi.re.kr
7 DF Ferraiolo, R Sandhu, S Gavrila, DR Kuhn, "Proposed NIST standard for role-based access control," ACM Transactions on Information and System Security (TISSEC), 2001
8 e-Science Definition, http://e-Science.ox.ac.uk/public/ general/definitions.xml, Oxford e-Science Centre
9 Foster, I. and Kesselman, C. and Tuecke, S., "The anatomy of the grid : Enabling scalable virtual organizations," Intl., J. Supercomputer Applications, 2001
10 SETI@Home: The Search for Extraterrestrial Intelligence Project, http://setiathome.berkeley.edu/
11 Globus Toolkit 3.2, http://www.globus.org/toolkit/
12 Hyuck Han, Hyungsoo Jung, Heon Y. Yeom, Hee S. Kweon, and Jysoo Lee, "HVEM Grid: Experiences in Constructing an Electron Microscopy Grid," The Eighth Asia Pacific Web Conference, Jan. 2006, Harbin, China (Also published in LNCS 3841, pp.1159-1162)
13 Alexander Barmouta, and Rajkumar Buyya, "GridBank: A Grid Accounting Services Architecture (GASA) for Distributed Systems Sharing and Integration," International Parallel and Distributed Processing Symposium (IPDPS'03), 2003
14 Ricahrd T. B. Ma, Sam C. M. Lee, John C. S. Lui, and David K. Y. Yay, "Incentive Resource Distribution in P2P Networks," In Proc. IEEE International Conference on Distributed Computing Systems, 2004
15 "SORMA Project," http://www.sorma-project.eu/
16 Ajith Kamath, Ramiro et.al, "User-Credential Based Role Mapping in Multi-domain Environment," Proceedings of the Privacy, Security, Trust (PST), 2006
17 BitTorrent Guide, http://www.dessent.net/btfaq/
18 Jian Liang, Rakesh Kumar and Keith W. Ross, "Understanding KaZaA," http://cis.poly.edu/~ross/papers /UnderstandingKaZaA.pdf
19 Oscar Ardaiz, Felix Freitag, Leandro Navarro, Torsten Eymann, and Michael Reinicke, "CatNet - Catallactic Mechanisms for Service Control and Resource Allocation in Large Scale Application- Layer Networks," Workshop on Global and Peer- to-Peer Computing on Large Scale Distributed Systems, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2002
20 Catalin Dumitrescu, Ian T. Foster, "GRUBER: A Grid Resource Usage SLA Broker," Euro-Par 2006
21 Im Young Jung, In Soon Cho, Heon Y. Yeom, Hee S. Kweon and Jysoo Lee, "HVEM DataGrid: Implementation of a Biologic Data Management System for Experiments with High Voltage Electron Microscope," Distributed, High-Performance and Grid Computing in Computational Biology (GCCB 2006), Jan. 2007
22 R. Alfieri, R. Cecchini, V. Ciaschini, L. dell' Agnello, A. Frohner, A. Gianoli, K. Lrentey, and F. Spataro, "VOMS: an Authorization System for Virtual Organizations," in 1st European Across Grids Conference, February 2003
23 David F. Ferraiolo and Richard Kuhn, "Role- Based Access Control," Proceedings of the 15th NIST-NSA National Computer Security Conference, 1992
24 Catalin Dumitrescu, Ian Foster and Ioan Raicu, "A Scalability and Performance Evaluation of a distributed Usage SLA-based Broker in Large Grid Environments," Technical Paper, University of Chicago
25 L. Gong and X. Qian, "Computational Issues in Secure Interoperation," IEEE Transaction on Software and Engineering, Vol. 22, No. 1, Jan., 1996
26 Mohamed Shehab, Elisa Bertino and Arif Ghafoor, "SERAT: SEcure Role mApping Technique for Decentralized Secure Interoperability," In Proc. ACM Symposium on Access Control, Models and Technologies(SACMAT'05), Sweden, June, 2005, Eilat, Israel, (Also published in LNCS 4360, pp. 175-190)