FLEXIBLE AND SECURE ACCESS TO COMPUTING CLUSTERS

被引:0
|
作者
Meizner, Jan [1 ]
Malawski, Maciej [1 ,2 ]
Bubak, Marian [2 ,3 ]
机构
[1] ACC CYFRONET AGH, Ul Nawojki 11, PL-30950 Krakow, Poland
[2] AGH Univ Sci & Technol, Dept Comp Sci, PL-30059 Krakow, Poland
[3] Univ Amsterdam, Informat Inst, NL-1081 HV Amsterdam, Netherlands
来源
COMPUTER SCIENCE-AGH | 2010年 / 11卷
关键词
clusters; security; single sign-on; federations; PAM modules; SSH; Shibboleth; SAML;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The investigation presented in this paper was prompted by the need to provide a manageable solution for secure access to computing clusters with a federated authentication framework. This requirement is especially important for scientists who need direct access to computing nodes in order to run their applications (e.g. chemical or medical simulations) with proprietary, open-source or custom-developed software packages. Our existing software, which enables non-Web clients to use Shibboleth-secured services, has been extended to provide direct SSH access to cluster nodes using the Linux Pluggable Authentication Modules mechanism. This allows Shibboleth users to run the required software on clusters. Validation and performance comparison with existing SSH authentication mechanisms confirm that the presented tools satisfy the stated requirements.
引用
收藏
页码:21 / 36
页数:16
相关论文
共 50 条
  • [31] Secure communication architecture for internet of things using smartphones and multi-access edge computing in environment monitoring
    Durresi, Mimoza
    Subashi, Anisa
    Durresi, Arjan
    Barolli, Leonard
    Uchida, Kazunori
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (04) : 1631 - 1640
  • [32] Secure and Authenticated Access to LLN Resources Through Policy Constraints
    Rantos, Konstantinos
    Fysarakis, Konstantinos
    Soultatos, Othonas
    Askoxylakis, Ioannis
    INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2015, 2015, 9311 : 271 - 280
  • [33] A secure bootstrap based on trusted computing
    Gu, Junkai
    Ji, Weiyong
    2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 502 - 504
  • [34] Secure Fog Computing for Smart Living
    McMillin, Bruce
    2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2017, : 707 - 707
  • [35] Secure Internet access to gateway using secure socket layer
    Bhatt, Deep Vardhan
    Schulze, Stefan
    Hancke, Gerhard P.
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2006, 55 (03) : 793 - 800
  • [36] Secure sharing with cryptography in cloud computing
    Chachapara, Kajal
    Bhadlawala, Sunny
    2013 4TH NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2013), 2013,
  • [37] A Secure Billing Protocol for Grid Computing
    Wei, Chia-Hui
    Chin, Yeo-Hao
    Li, Chun-Ta
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 320 - +
  • [38] Secure integration of IoT and Cloud Computing
    Stergiou, Christos
    Psannis, Kostas E.
    Kim, Byung-Gyu
    Gupta, Brij
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 964 - 975
  • [39] SECURE PERSONAL COMPUTING IN AN INSECURE NETWORK
    DENNING, DE
    COMMUNICATIONS OF THE ACM, 1979, 22 (08) : 476 - 482
  • [40] eNVM based In-memory Computing for Intelligent and Secure Computing Systems
    Huang, Kejie
    Qin, Chuyun
    32ND IEEE INTERNATIONAL SYSTEM ON CHIP CONFERENCE (IEEE SOCC 2019), 2019, : 348 - 353