FLEXIBLE AND SECURE ACCESS TO COMPUTING CLUSTERS

被引:0
|
作者
Meizner, Jan [1 ]
Malawski, Maciej [1 ,2 ]
Bubak, Marian [2 ,3 ]
机构
[1] ACC CYFRONET AGH, Ul Nawojki 11, PL-30950 Krakow, Poland
[2] AGH Univ Sci & Technol, Dept Comp Sci, PL-30059 Krakow, Poland
[3] Univ Amsterdam, Informat Inst, NL-1081 HV Amsterdam, Netherlands
来源
COMPUTER SCIENCE-AGH | 2010年 / 11卷
关键词
clusters; security; single sign-on; federations; PAM modules; SSH; Shibboleth; SAML;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The investigation presented in this paper was prompted by the need to provide a manageable solution for secure access to computing clusters with a federated authentication framework. This requirement is especially important for scientists who need direct access to computing nodes in order to run their applications (e.g. chemical or medical simulations) with proprietary, open-source or custom-developed software packages. Our existing software, which enables non-Web clients to use Shibboleth-secured services, has been extended to provide direct SSH access to cluster nodes using the Linux Pluggable Authentication Modules mechanism. This allows Shibboleth users to run the required software on clusters. Validation and performance comparison with existing SSH authentication mechanisms confirm that the presented tools satisfy the stated requirements.
引用
收藏
页码:21 / 36
页数:16
相关论文
共 50 条
  • [1] SFAPCC: A Secure and Flexible Architecture for Public Cloud Computing
    Li, Baohui
    Xu, Kefu
    Zhang, Chuang
    Hu, Yue
    TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014), 2015, 520 : 160 - 165
  • [2] A Secure Infrastructure for Service Discovery and Access in Pervasive Computing
    Jeffrey Undercoffer
    Filip Perich
    Andrej Cedilnik
    Lalana Kagal
    Anupam Joshi
    Mobile Networks and Applications, 2003, 8 : 113 - 125
  • [3] A secure infrastructure for service discovery and access in pervasive computing
    Undercoffer, J
    Perich, F
    Cedilnik, A
    Kagal, L
    Joshi, A
    MOBILE NETWORKS & APPLICATIONS, 2003, 8 (02) : 113 - 125
  • [4] Bearicade: secure access gateway to High Performance Computing systems
    Al-Jody, Taha
    Holmes, Violeta
    Antoniades, Alexandros
    Kazkouzeh, Yazan
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1421 - 1428
  • [5] Secure access policy for efficient resource in mobile computing environment
    Jo S.-M.
    Journal of Computer Virology and Hacking Techniques, 2017, 13 (04) : 297 - 303
  • [6] A Flexible and Adaptive Hybrid Algorithm for Secure Data Sharing in Cloud Computing
    Thushara, G. A.
    Bhanu, S. Mary Saira
    2022 IEEE 19TH INDIA COUNCIL INTERNATIONAL CONFERENCE, INDICON, 2022,
  • [7] Towards Secure Risk-Adaptable Access Control in Cloud Computing
    Abdullah, Salasiah
    Abu Bakar, Khairul Azmi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (12) : 324 - 330
  • [8] A Secure Cloud Computing System by Using Encryption and Access Control Model
    Mahmood, Ghassan Sabeeh
    Huang, Dong Jun
    Jaleel, Baidaa Abdulrahman
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2019, 15 (03): : 538 - 549
  • [9] FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing
    Zhang, Yu
    Chen, Jing
    Du, Ruiying
    Deng, Lan
    Xiang, Yang
    Zhou, Qing
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 310 - 319
  • [10] Biometric based authentication and access control techniques to secure Mobile Cloud Computing
    Khatri, Sunil Kumar
    Monica
    Vadi, Vikas Rao
    2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 371 - 377