Grid Computing: 1. Abstract
Grid Computing: 1. Abstract
PAPER PRESENTATION
ON
GRID COMPUTING
1. ABSTRACT organizational rather than the individual level. Thus,
expressing restrictive policies on a user-by-user
Grid computing is a method of harnessing basis often proves difficult. Also, frequently a
the power of many computers in a network to solve single transaction takes place across many grid
problems requiring a large number of processing nodes that are dynamic and unpredictable. Finally,
cyc1es and involving huge amounts of data. The unlike the Internet, a grid gives outsiders complete
grid computing helps in exploiting underutilized access to a resource, thus increasing the security
resources, achieving parallel CPU capacity; provide risk. Grid security is a multidimensional problem.
virtual resources for collaboration and reliability. Organizations participating in grids must use
Although commercial and research organizations appropriate policies, such as firewalls, to harden
might have collaborative or monetary reasons to their Infrastructures while enabling interaction with
share resources, they are unlikely to adopt such a outside resources.
distributed infrastructure until they can rely on the
confidentiality of the communication, the integrity In this paper, we briefly describe the reasons
of their data and resources, and the privacy of the for using grid computing and analyze the unique
user information. In other words, large-scale security requirements of large-scale grid computing.
deployment of grids will occur when users can We propose a security policy for grid systems that
Grid Computing is a method of harnessing operability with local policies, and dynamically
the power of many computers in a network to solve varying resource requirements. This policy focuses
problems requiring a large number of processing on authentication of users, resources, and processes
cycles and involving huge amounts of data. Grid and supports user-to-resource, resource-to-user,
The potential for massive parallel CPU capacities, synchronization protocols, input-output
capacity is one of the most attractive features of a bandwidth to devices and storage devices, and
latencies interfering with real-time requirements. software, services, licenses, and others. These
Other sources of inter-job content in parallel grid resources are “virtualized” to give them a more
application include message communications uniform interoperability among heterogeneous grid
latencies among the jobs. participants.
Virtual resources and Virtual Organizations Reliability
for Collaborations High-end conventional computing systems
Another important grid computing use expensive hardware to increase reliability. They
contribution is to enable and simplify collaboration are built using chips with redundant circuits that
among a wider audience. In the past, distributed vote on results, and contain much logic to achieve
computing promised this collaboration and achieved graceful recovery from an assortment of hardware
it to some extent. Grid computing takes these failures. The machines also use duplicate processors
capabilities to an even wider audience, while with hot plug ability so that when they fail, one can
offering important standards that enable very be replaced without turning the other off. Power
heterogeneous systems to work together to form the supplies and cooling systems are duplicated. The
image of a large virtual computing system offering systems are operated on special power sources that
a variety of virtual resources. The users of the grid can start generators if utility power is interrupted.
can be organized dynamically into a number of All of this builds a reliable system, but at a great
virtual organizations, each with different policy cost, due to the duplication of high-reliability
requirements. These virtual organizations can share components.
their resources collectively as a larger grid. In the future, we will see a complementary
Sharing starts with data in the form of files approach to reliability that relies on software and
or databases. A “data grid” can expand data hardware. A grid is just the beginning of such
capabilities in several ways. First, files or databases technology. The systems in a grid can be relatively
can seamlessly span many systems and thus have Inexpensive and geographically dispersed. Thus, if
larger capacities than on any single system. Such there is a power or other kind of failure at one
spanning can improve data transfer rates through location, the other parts of the grid are not likely to
the use of striping techniques. Data can be be affected. Grid management software can
duplicated throughout the grid to serve as a backup automatically resubmit jobs to other machines on
and can be hosted on or near the machines most the grid when a failure is detected. In critical, real-
likely to need the data, in conjunction with time situations, multiple copies of the important
advanced scheduling techniques. jobs can be run on different machines throughout
Sharing is not limited to files, but also the grid. Their results can be checked for any kind
includes many other resources, such as equipment, of inconsistency, such as computer failures, data
corruption, or tampering. Such grid systems will importance with a specific deadline. A grid cannot
utilize “autonomic computing.” This is a type of perform a miracle and achieve a deadline when it is
software that automatically heals problems in the already too close. However, if the size of the job is
grid, perhaps even before an operator or manager is known, if it is a kind of job that can be sufficiently
aware of them. In principle, most of the reliability split into sub jobs, and if enough resources are
attributes achieved using hardware in today’s high available after preempting lower priority work, a
availability systems can be achieved using software grid can bring a very large amount of processing
in a grid setting in the future. power to solve the problem. In such situations, a
grid can, with some planning, succeed in meeting a
Resource balancing
surprise deadline.
A grid federates a large number of resources
3. Security in Grid Computing
contributed by individual machines into a greater
total virtual resource. For applications that are grid- a. The Grid Security Problem
enabled, the grid can offer a resource balancing We introduce of grid security problem with
effect by scheduling grid jobs on machines with low and example illustrated in figure1. We imagine a
utilization. This feature can prove invaluable for scientist, a member of a multi-institutional scientific
handling occasional peak loads of activity in parts collaboration, who receives e-mail from a colleague
of a larger organization. This can happen in two regarding a new data set. He starts an analysis
ways: An unexpected peak can be routed to program, which dispatches code to the remote
relatively idle machines in the grid and if the grid is location where the data is stored (site C). Once
already fully utilized, the lowest priority work being started, the analysis program determines that it
performed on the grid can be temporarily needs to run a simulation in order to compare the
suspended or even cancelled and performed again experimental results with predictions. Hence, it
later to make room for the higher priority work. contacts a resource broker service maintained by the
Without a grid infrastructure, such balancing collaboration (at site D), in order to locate the
decisions are difficult to prioritize and execute. resources that can be used for the simulation. The
The security policy defined in section c applications may run for extended period of time,
provides a context with in which we can construct the user may wish to allow a computation to operate
specific security architecture. In doing so, we without intervention. Hence, we introduce the
specify the set of subjects and objects that will be concept of a user proxy that can act on a user’s
under the jurisdiction of the security policy and behalf without requiring user intervention.
define the protocols that will govern interactions Definition: A user proxy is a session
between these subjects and objects. Fig 2 shows an manager process given permission to act on behalf
Traditional computing environments don’t allocation requests must pass via the user proxy is a
provide flexibility for sharing resources to form potential bottleneck this must be evaluated in
“virtual organizations”. Grid computing provides a realistic applications and, if required, addressed in
promising and efficient way of using computing and future work. One major scalability issue that is not
storage resources. It serves as “Computing on addressed is the number of users and resources.
Demand” model similar to the way electrical power Clearly, other approaches to the establishment of
is used. Ideal for collaborative environments global to local mappings ~ be required when the
because it provides dynamic resource sharing number of users and/or resources are large on
among different geographic locations and also it example is the use-condition approaches to
hides the complexity from the user who will see the authorization. However, we believe the current
grid as a huge computing and storage device. approach can deal with this.