FLEXIBLE AND SECURE ACCESS TO COMPUTING CLUSTERS

被引:0
|
作者
Meizner, Jan [1 ]
Malawski, Maciej [1 ,2 ]
Bubak, Marian [2 ,3 ]
机构
[1] ACC CYFRONET AGH, Ul Nawojki 11, PL-30950 Krakow, Poland
[2] AGH Univ Sci & Technol, Dept Comp Sci, PL-30059 Krakow, Poland
[3] Univ Amsterdam, Informat Inst, NL-1081 HV Amsterdam, Netherlands
来源
COMPUTER SCIENCE-AGH | 2010年 / 11卷
关键词
clusters; security; single sign-on; federations; PAM modules; SSH; Shibboleth; SAML;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The investigation presented in this paper was prompted by the need to provide a manageable solution for secure access to computing clusters with a federated authentication framework. This requirement is especially important for scientists who need direct access to computing nodes in order to run their applications (e.g. chemical or medical simulations) with proprietary, open-source or custom-developed software packages. Our existing software, which enables non-Web clients to use Shibboleth-secured services, has been extended to provide direct SSH access to cluster nodes using the Linux Pluggable Authentication Modules mechanism. This allows Shibboleth users to run the required software on clusters. Validation and performance comparison with existing SSH authentication mechanisms confirm that the presented tools satisfy the stated requirements.
引用
收藏
页码:21 / 36
页数:16
相关论文
共 50 条
  • [21] An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing
    Ahuja, Rohit
    Mohanty, Sraban Kumar
    Sakurai, Kouichi
    2016 11TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2016, : 39 - 47
  • [22] Flexible and extendable mechanism enabling secure access to e-infrastructures and storage of confidential data for the GridSpace2 virtual laboratory
    Meizner, Jan
    Ciepiela, Eryk
    Nowakowski, Piotr
    Kocot, Joanna
    Malawski, MacIej
    Bubak, Marian
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012, 7136 LNCS : 89 - 101
  • [23] Secure virtualization for cloud computing
    Lombardi, Flavio
    Di Pietro, Roberto
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) : 1113 - 1122
  • [24] A Model for Secure Mobile Computing
    du Toit, Jaco
    Ellefsen, Ian
    2015 SCIENCE AND INFORMATION CONFERENCE (SAI), 2015, : 1213 - 1221
  • [25] A framework for secure enterprise computing
    Kang, MH
    Froscher, JN
    IEEE 9TH INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2000, : 219 - 220
  • [26] Common Randomness for Secure Computing
    Narayan, Prakash
    Tyagi, Himanshu
    Watanabe, Shun
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 949 - 953
  • [27] SPS: Secure Personal Health Information Sharing with Patient-centric Access Control in Cloud Computing
    Barua, Mrinmoy
    Lu, Rongxing
    Shen, Xuemin
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 647 - 652
  • [28] Study of Access Control Techniques on the Blockchain-enabled Secure Data Sharing Scheme in Edge Computing
    Mathur, Neha
    Sinha, Shweta
    Tyagi, Rajesh Kumar
    Jatana, Nishtha
    Recent Advances in Computer Science and Communications, 2024, 17 (08) : 1 - 13
  • [29] Secure IMS access signaling
    Balakrishnan, Meera
    Bose, Mousom
    2007 INTERNATIONAL CONFERENCE ON IP MULTIMEDIA SUBSYSTEMS ARCHITECTURE AND APPLICATIONS, 2007, : 39 - 43
  • [30] Secure communication architecture for internet of things using smartphones and multi-access edge computing in environment monitoring
    Mimoza Durresi
    Anisa Subashi
    Arjan Durresi
    Leonard Barolli
    Kazunori Uchida
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 1631 - 1640