FLEXIBLE AND SECURE ACCESS TO COMPUTING CLUSTERS

被引:0
|
作者
Meizner, Jan [1 ]
Malawski, Maciej [1 ,2 ]
Bubak, Marian [2 ,3 ]
机构
[1] ACC CYFRONET AGH, Ul Nawojki 11, PL-30950 Krakow, Poland
[2] AGH Univ Sci & Technol, Dept Comp Sci, PL-30059 Krakow, Poland
[3] Univ Amsterdam, Informat Inst, NL-1081 HV Amsterdam, Netherlands
来源
COMPUTER SCIENCE-AGH | 2010年 / 11卷
关键词
clusters; security; single sign-on; federations; PAM modules; SSH; Shibboleth; SAML;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The investigation presented in this paper was prompted by the need to provide a manageable solution for secure access to computing clusters with a federated authentication framework. This requirement is especially important for scientists who need direct access to computing nodes in order to run their applications (e.g. chemical or medical simulations) with proprietary, open-source or custom-developed software packages. Our existing software, which enables non-Web clients to use Shibboleth-secured services, has been extended to provide direct SSH access to cluster nodes using the Linux Pluggable Authentication Modules mechanism. This allows Shibboleth users to run the required software on clusters. Validation and performance comparison with existing SSH authentication mechanisms confirm that the presented tools satisfy the stated requirements.
引用
收藏
页码:21 / 36
页数:16
相关论文
共 50 条
  • [41] SACP: Secure Access Control Protocol
    Ben Daoud, Wided
    Rekik, Malek
    Meddeb-Makhlouf, Amel
    Zarai, Faouzi
    Mahfoudhi, Sami
    IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, : 935 - 941
  • [42] Secure access of products in a process environment
    Chou, SC
    Lai, CW
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2005, E88D (02): : 197 - 203
  • [43] Making HeNB More Secure with Improved Secure Access Protocol and Analyzing It
    Najm, Fariba Ghasemi
    Payandeh, Ali
    Habibi, Hashem
    MOBILE NETWORKS AND MANAGEMENT, MONAMI 2015, 2015, 158 : 107 - 120
  • [44] A Security Framework for Secure Cloud Computing Environments
    Jouini, Mouna
    Rabai, Latifa Ben Arfa
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2016, 6 (03) : 32 - 44
  • [45] Towards secure mobile cloud computing: A survey
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Khan, Samee U.
    Madani, Sajjad A.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (05): : 1278 - 1299
  • [46] On Secure Wireless Communications for Service Oriented Computing
    Zhang, Yuanyu
    Shen, Yulong
    Wang, Hua
    Zhang, Yanchun
    Jiang, Xiaohong
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2018, 11 (02) : 318 - 328
  • [47] A Survey on Secure Data Analytics in Edge Computing
    Liu, Dan
    Yan, Zheng
    Ding, Wenxiu
    Atiquzzaman, Mohammed
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03): : 4946 - 4967
  • [48] A secured load balancing architecture for cloud computing based on multiple clusters
    Belkhouraf, Mohamed
    Kartit, Ali
    Ouahmane, Hassan
    Kamal Idrissi, Hamza
    Kartit, Zaid
    El Marraki, Mohamed
    2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 148 - 153
  • [49] Trusted Platforms to secure Mobile Cloud Computing
    Thinh Le Vinh
    Bouzefrane, Samia
    2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 1068 - 1075
  • [50] Secure cloud computing using homomorphic construction
    Swathi V.
    Vani M.P.
    International Journal of Cloud Computing, 2019, 8 (04): : 354 - 370