Sei sulla pagina 1di 33

Comparison between security solutions in Cloud and Grid Computing and Future in grid Computer

A Dissertation In partial fulfilment for the award for the degree of Master of Computer Application in Department Of Computer Applications Suresh Gyan Vihar University

SUPERVISOR
SHANTANU VARSHNEY

SUBMITTED BY:AARIF HABEEB SGVU111555835 ANITA SGVU11556034

Department of Computer Applications,

Master of Computer Applications (MCA)

Table of Contents
Abstract Acknowledgement 1. Introduction 2. Background 2.1. Benefits of Cloud Computing 2.2. Benefits of Grid Computing 2.3. Common issues 2.4. Difference between both 3. How to identify problem 3.1. Security issues in Cloud Computing 3.2. Security issues in Grid Computing 3.3. Comparison between security issues 4. Analysis of problem 4.1. Main difference between both 4.2. Method used for both technologies 5. Future of Grid Computing 5.1. Existing systems 5.2. Research area in Grid 5.3. Present and future generations of Grid 6. Conclusion 7. Future work References

Abstract:
Purpose: This paper helps Grid and Cloud system Student and researchers Student to have a clear definition about Grid and Cloud computing and also wants to give clear differences between Cloud and Grid computing, define which are the main security issues to be considered, and how some of these security issues are solved. It also shows how existing security methods used in one of these technologies can be used in the other. This paper also help to know comprehensive survey to grid computing technology and clarifies its different aspects in the domain of security and future in the grid computing. The research paper also investigates merging trends in the modern grid computing technology. Grid computing is one the state of the art technologies being used for high speed computing. Design/methodology/approach: A study about 11 different papers has been done in order to find common security solutions. Research limitations/implications: This is research done for the subject Dissertation in the Masters Programme in Computer Application. No practical demonstrations were done while writing this paper. Practical implications: The findings of this study can be used by Students of Grid and Cloud applications to develop new security solutions. This paper demonstrate the technologies such as TPM and trust relationship management that could be used in both technologies. Keywords: Cloud Computing, Grid Computing, Security,Mobile services, research, reusability. Paper type: Research paper

ACKNOWLEDGEMENT
Achieving a milestone for any person alone is extremely difficult. However there are some motivators who come across the curvaceous path like twinkling star in the sky and make our task much easier. It becomes our humble and foremost duty to acknowledge all of them. Our ethical accountability is to extremely indebted to Mr. Bright Keswani (PC-CA) for his excellent guidance. We are highly obliged and thankful to our project guide Mr. Shantanu Varshney who provided immense support as answer to our extreme queries that we kept firing at them during the preparation of our project. Last but not least, we pay our sincere thanks in gratitude to all the staff members of Suresh Gyan Vihar University to provide excellent opportunity and environment throughout our project

Aarif Habeeb SGVU111555835 Anita SGVU111556034

1. Introduction
Cloud computing is currently a buzzword in the world of computing, and a few moments of browsing the Web will soon reveal an extensive range of Cloud services and products. The reason for this great interest is that it offers whatsome earlier technologies have wanted to do, namely, access to processing and storage power on demand. Yet, despite its high profile, many people do not really know what it is. In essence, Cloud computing is the outsourcing of what has been described as an unlimited range of computer resources, for instance processing power and storage capacity, by means of virtualization, i.e. it lets a private user to do the simulation of artificial intelligence tests that consume lots of resources in little time. Cloud computing appears to all sorts of users, from businesses to private individuals, for various reasons. Chief among the attractions is the fact that these users have the opportunity to pay as they go: pay-per-use (PPU) or pay-on demand (POD). This method of paying is not new. Indeed,we have been using this business model so many years; for instance, electricity suppliers employ this method to charge for electricity used at home, where households pay for as much as they use, instead of paying monthly. Another example would be for pay-as-yougo for mobile phones. What the PPU system offers, however, is flexibility: we only pay for what we use and when we use it. What is also not as novel as we may think is that Cloud computing shares a number of similar issues with older technologies, such as Grid Computing, in which the resources of many computers in a network are utilized simultaneously, making it possible for users (companies,

researchers, governments etc. to store, exploit and retrieve massive amounts of data. Cloud computing may seem to offer great benefits, and both, individuals and organizations are adopting it rapidly.However, there are problems associated with this system/environment. The main problem according to Ian Foster, Yong Zhao, Ioan Raicu and Shiyong Lu is that, everytime a company wants to provide a service, there arises a common need to use and manage large facilities. This kind of managing of systems is used for using and requesting resources that are provided by central facilities like data centers. Highly parallel computations are implemented in these environments and executed through these distributed resources. What has happened is that we have created a new environment in which vast amounts of information are being distributed through a large number of computers. One consequence of this is the issue of security. The large and extensive scale of Cloud computing activities require effective security. One source of solutions is found in existing technologies, therefore, if we take into consideration that Cloud Computing and Grid Computing have a lot of architectural and design issues in common, we should be able to, based on one study of the security in both technologies, reuse some of the existing security solutions and thus avoid reinventing the wheel. The purpose of this paper is to explore the main security problems in Cloud and Grid Computing and compare them, define which common security solutions, used only in one of the technologies, would be valid for both systems.

2. Background
This section summarizes the basic concepts of Cloud and Grid Computing before we go deeper into security details in section 3.

2.1 What is Cloud Computing and what are its benefits?

One good definition of Cloud Computing is given by Y. Zhao, M. Wilde, I. Foster, J. Voeckler, J. Dobson, E. Gilbert, T. Jordan and E. Quigg in 2005: A Large-scale distributed computing paradigm that is driven by economies of scale, in which a pool of abstracted, virtualized, dynamically scalable, managed computing power, storage, platforms, and services are delivered on demand to external customers over the Internet". Cloud Computing offers its users services and applications, which are provided through the Internet, and thus, a large number of computers will be in the path of the data when the data is sent to the Cloud for analysis and also when the data is coming back from the Cloud, once the analysis has been already carried out. For instance, a Mobile phone or PDA with low processing power and/or low storage capacity could take advantage of the Cloud and store or process data inside it, which would allow the mobile phone or the PDA to use applications which require more processing power than the processing power available in these kinds of electronic devices and, which will also require a permanent broadband connection in order to send and receive data at any moment from any place, thus allowing the user to access the services wherever you are. As another example of possible users that would be interested in Cloud Computing, there are lots of small and medium-sized companies that want to provide users with a new service which requires a lot of processing power, storage power and even networking capacity. To establish this infrastructure, the company should invest a lot of money in a large number of computers to process all the incoming requests, even if the peak load appears only once in a while and for these companies it makes it impossible to deploy the service due to the lack of resources. To solve this, one very small company which wants to provide a new service to a large number of customers could either use its own private Cloud which can be either one or two computers, for example, every time a peak demand appears, use the public Cloud to process the data (one example is mazonEC2) or directly put its server into the Cloud and pay for the amount of processing power or storage capacity used at the end of the month: instead of contracting two servers for the full month,

when required, they could contract one small server and increase the processing capacity through the Cloud processing and/or storage services. As stated by David Linthicum, Cloud Computing can be given in some different ways: Storage-as-a-service: It offers disk space on demand. Database-as-a-service: Gives the possibility of using remote services which other users might be using at the same time. Information-as-a-service: Allows access to data stored in a remote server. Process-as-a-service: To be able to have processes running in the Cloud. Application-as-a-service: It means to have one application provided by the Cloud provider available on demand through the Cloud, for instance, a very heavy application that requires a lot of storage or processing power. Platform-as-a-service: SDK provided by the Cloud provider that allows the programmer to develop new applications that will run in the Cloud. Integration-as-a-service: Allows to have an integrated system which acts like a intermediary between the data given by the company and the Software allocated into the Cloud (This software can make some XML parsing or even format conversion). Security-as-a-service: Grants the possibility to have security applications running directly in the Cloud: for instance, an antivirus system.

Management-as-a-service: Service that allows the controlling and managing of multiple Clouds from one place. Testing-as-a-service: Allows us to make testing through specific testing software running in the Cloud, for example, testing Artificial intelligence software that requires lots of processing power. Infrastructure-as-a-service: Provides data center-as a-service, which means to have access remotely to computing resources. About the computing model in Cloud Computing, according to Ian Foster, Yong Zhao, Ioan Raicu and ShiyongLu, the resources in the Cloud are shared by all users at the same time, which will allow latency sensitive applications to operate inside these Clouds, but the Quos assurance is not an easy issue. In addition, Cloud computing uses virtualization in order to share resources. The reasons for Cloud Computing to rely in virtualizations are: 1) It allows to execute multiple applications on the same server. 2) The configuration of the resources for each application can be easily managed. 3) If more resources are needed, the application can be moved to one or more servers with more resources. 4) Resource, provisioning, monitoring and maintenance can be automated, and common resources can be cached and reused. 5) Processor manufacturers introduced hardware support for virtualization, which is why the performance of this method has developed further.

2.2 What is Grid Computing and what are its benefits? Alternatively we have Grid Computing, which is well defined by Mary Humphrey and Mary R. Thomson: A Computational Grid is a collection of heterogeneous computers and resources spread across multiple administrative domains with the intend of providing users easy

access to these resources. Ian Foster made a three point checklist to define what a Grid is.

coordinates resources that are not subject to centralized control: Which means that not only one entity manages all the system but some different system administrators could be managing different parts of the same Grid at the same time. using standards, open, general-purpose protocols and interfaces: This will allow to all the companies involved in the Grid to use and access these standards. to deliver nontrivial qualities of service: In Grid computing not a fixed rate of load is going to be managed and this can be given small or big rates. This phenomenon causes the given quality of service to vary and not always stay constant. Grids allow the use of idle resources. Through this, companies create a Grid in order to share those idle resources and, if necessary, they can access more computational resources (shared by other companies) than they usually can, and share their own resources while they are not carrying out any computationally demanding tasks. About the architecture, a lot of heterogeneous hardware isused in order to create the Grid and, in addition, these devices are not managed by only one person but by different system administrators in each of the companies. This situation causes the security, administration policies and network managing to become heterogeneous too, thus more difficult to manage. However, not only companies can make use of these Grids; users can do it too. One successful example would be the Seti@home project, a program that attempts to find extra terrestrial life, where users install a program and, while not using the resources, idle resources are used to processes mall packets or tasks, and return the processed information to the main server.

Finally, if we take a look at what Ian Foster, Yong Zhao, Ioan Raicu and Shiyong Lu have stated: most Grids use a batch-scheduled compute mode, in which a local resource manager (LRM), such as PBS Condor, SGE manages the compute resources for a Grid site and users submit batch jobs (via GRAM) to request some resources for some time., this necessitates having a fair scheduling system that avoids that one process from using all the resources and leaving none for the rest.

2.3. What are the common issues between Cloud and Grid Computing? As stated earlier, Cloud and Grid Computing are similar technologies that share lots of issues. The most important things that both technologies have in common: 1. To achieve good scalability, data must be distributed over many computers. 2. People can be afraid of sending sensitive data through a large number of computers. 3. Data must be moved repeatedly to distant computers, which generates the bottleneck of the process, since the data is not always available everywhere and sometimes it is necessary to make this data available. 4. Data can be requested regardless of its location. 5. Cloud and Grid computing provide service-level agreements (SLAs) for guaranteed uptime availability of, say, 99 percent. If the service slides below the level of the guaranteed uptime service, the consumer will get service credit for receiving data late. 6. Both systems must be able to determine the amount of unused resources.

2.4. What are the differences between Cloud and Grid Computing? Since our main objective is to know the difference between Cloud and Grid computing and afterwards compare them from the point of view of

security, here we have a list of differences between Grid and Cloud in order to clarify what are the main differences between Cloud and Grid computing: 1. Cloud computing normally runs in a set of homogeneous computers, but Grid, on the other hand, runs on heterogeneous computers. 2. Grid computing is normally focused on an intensive calculus, while Cloud Computing offers two types of calculuss: standard and intensive. 3. Grid computing is open-source while Cloud Computing is not. This creates inter operability problems between todays Clouds. 4. Most Grids use a batch-scheduled compute model, while in Cloud Computing all users share all the resources at the same time. And this is why latency sensitive applications, which could run in Grids, could not Be supported in Cloud Computing. 5. Grids do not rely on virtualization as much as Cloud does. 6. Cloud Computing does not support as much provenances Grid does, which is a derivation history of a data product, including all the data sources, intermediate data products, and the procedures that were applied to produce the data product. 7. High Performance computing is better supported in Grid computing than in Cloud Computing. 8. Grid is distributed, has multiple research user communities (including users accessing resources from varied administration domains) and is grouped in Virtual Organizations. Cloud Computing, on the other hand, usually has only one research community and a common group of system administrators that take care of the entire Cloud. 9. Grid is mostly publicly funded at local, national and international levels, while Cloud Computing is funded mainly by its users. 10. Grid computing, must share user and resource interfaces to allow providers to connect their resources,while Cloud Computing attempts to share only the user interface while the resources interfaces are hidden and given in an abstract way. 11. In Grid computing, the trust model is based on identity delegation, where users can access and browse resources, which are not highly abstracted and virtualized at different Grid sites. In Cloud computing resources are abstracted and virtualized and this trust model does

not exist since everything is inside the same Cloud. 12. While in Grid computing, storing very small files (e.g.1-byte files) is not economically suitable, in Cloud Computing it is.

3. How to identify the problem 3.1. Security issues in Cloud computing As with every distributed system, Cloud Computing has lotsof problems. We have to take care of the network infrastructure, which is not always in our control, and be very carefulwith the data in order to avoid third parties from capturing it. Some security solutions and problems have been: Web application vulnerary abilities: Cross scripting, SQL injections. Solution: Develop a security oriented framework that teaches the best programming practices. Vulnerabilities inherent to the TCP/IP stack and/or the operating systems: DoS, and DDoS (Distributed denial of service). Solution: Deactivate unused services, update applications and control rights. Authentication problems: IP spoofing, RIP attacks, ARP poisoning. Solution: Use encrypted protocols if possible prevents IP spoofing, controlling rights to access ARP tables etc. The verification, tampering and loss of data.

Solution: Encrypted data would be a solution, but, since the unencrypted data must reside in the memory of the host running the computation, this must be encrypted in order to avoid memory copies. Physical access. Solution: Control rights and log actions when accessing the hardware. Privacy control of data. Solution: Use Service-level agreements. Another solution, given by the Trusted Computing Group (TGC) is the Trusted platform module (TPM):Chip with Private key and cryptographic algorithms (not rewritable). The public key is signed by the manufacturer to guarantee the correctness of the key. It protects the booting process through hashes of the SW involved in the boot sequence. As stated by Nuno Santos, Krishna P., Gummadi Rodrigo Rodriguez, customers cannot protect their VMs on their own and anyone with privileged access to the host can read or manipulate customers data. These insiders create a need to have a technical solution that guarantees the confidentiality and integrity of computation, in a way that is verifiable by the customers of a service. So, they proposed a new system called TCCP (Trusted Cloud Computing Platform), which is mainly focused in IaaS (Infrastructure as a Service) and based on two components: To install a TVMM, each node uses a TPM to ensure the boot process. Trusted virtual machine monitor (TVMM): Prevents privileged users from inspecting or modifying VMs and protects its own integrity. Trusted Coordinator (TC): Manages which nodes are trusted and which are not through a record. A node, therefore, only cooperates with other trusted nodes. Some other issues were considered by Ian Foster, Yong Zhao, Ioan Raicu and Shiyong Lu:

Monitoring can be less important because Cloud Computing has an abstract layer that could respond to failures and qualities of service automatically. Cloud Computer security infrastructure typically relies on Web forms(over SSL) to create and manage account information for end users, and allows users to reset their passwords and receive new passwords via email through unsafe and unencrypted communication. In addition, taking into account that Cloud Computing relies on web page management where the user can register himself into a web page and have almost instant access to the resources through a credit card, a credit card validation system is needed and some other issues like webbased vulnerary abilities prevented.

3.2. Security issues in Grid computing As with Cloud Computing, Grid Computing has a lot of security issues that should be considered since it is a distributed system where a heterogeneous set of computers share their idle resources. Marty Humphrey, Mary R. Thompson defined various scenarios and gave various clues on how Grid security should be managed and what are its problems. Here is a list of the challenges and their solutions: A machine is sharing its resources and the user is running applications. Then it is needed to assure that the machine has not been compromised. Solution: A specialized scheduler that allows users with enough rights to run applications. Local user ID and Grid user ID must be mapped. Solution: It can be done through the use of centralized domain controllers, for instance, Open Lap, that provide user authentication and

authorization methods. Others give another solution: a single Grid signin mechanism. Access to logs that are controlled by various users. Solution: To do this special security libraries can be used to access the data and control who did what. Determine access policies to services either locally or remotely. Solution: The authorization policy must locally be digitally signed by the owner and kept securely. Remotely, the owner must be able to have a secure connection and authenticate himself. Data integrity and confidentiality should be achieved. Solution: Integrity is achieved through MAC algorithms. Confidentiality is achieved through encryption methods and keys with a limited life time. Proper key management. Solution: One possibility is to use smart cards. Trust relationships between users and domains/hosts become imperative. Solution: Authentication is achieved by SSL credentials or secure DNS and IPSec. Delegation of rights to one or multiple persons is a problem with no clear solution yet. Information must be available and can be requested from everywhere.

Solution: So in order to have availability,information services are used. LDAP can be used to these purposes since it gives user/password access control and can map the users id to his services directory.

Firewalls and VPNs between Grids domains became a challenge. Solution: Infrastructure servers can be configured to run on known ports which can be allowed by the firewall. In the case of VPN, certificates like x509 identity certificates would be a good solution to allow access to other Grid domains. Physical access security has to be considered as well. As with Cloud Computing, some other issues about Grid Computing have been considered by Ian Foster, Yong Zhao, Ioan Raicu and Shiyong Lu as well: Public-key based GSI (Grid Security Infrastructure) protocols are used for authentication, communication protection and authorization. Grid computing is more heterogeneous and has dynamic resources, which is why it should address some issues: A single sign-in method to access multiple Grid sites, privacy, integrity and segregation should be taken into account so that resources owned by one user cannot be accessed by unauthorized users and/or tampered with during transfer. Community Authorization Service(CAS) is used for advanced resource authorization within and across domains. 3.3. A comparison between Cloud and Grid Computing security solutions

Now a days, and knowing that Grid Computing is a much more mature technology than Cloud computing is, we would agree that the security is better in Grid than in Cloud Computing. This thought is shared by Ian Foster, Yong Zhao, Ioan Raicu and Shiyong Lu who said that Cloud Computing security model seems to be relatively simpler and less secure than the security model adopted by Grids. .Talking about how a software is normally considered secure or not, we could think about the development process,where testing is done through it and bugs are taken out of the code; and compare it to Cloud Computing, which has been less tested than Grid computing, and so it is very probable that in the future more bugs will be discovered, compared to Grid technologies that have already been tested.To compare Cloud and Grid security, we will use security issues from the previous sections and show what are the main differences in section 5.1 and in section 5.2 we will describe some methods that can be used for both technologies. 4. Analysis of problem 4.1. The main differences between Grid and Cloud Computing As long as Cloud computing has more homogeneous platforms and Grid computing more heterogeneousones and dynamic resources, Grid has to consider some issues that Cloud Computing does not have: Single sign-in to access multiple Grid sites, privacy, integrity and segregation should be taken into account so that resources owned by one user cannot be accessed by unauthorized users and/or tampered with during transfer. Cloud users can use Cloud easily and almost instantly through a credit card, while Grid security is stricter and does not give this feature. The strict security approach given by Grid computing adds security, helping to prevent unauthorized access, while Cloud computing does not.

Defining a framework which has to be used to program for the Cloud gives an additional possibility to manage security, while the more open system given by Griddoes not. Grid computing, must share user and resource interface to allow providers to connect their resources, while Cloud Computing tries to share only the user interface while the resource interfaces are hidden. Since Cloud computing relies on web applications, it has the vulnerabilities of web applications, which Grid does not have. In Grid computing all the resources are shared with other users so the machines security should not be compromised. In Cloud computing, virtualization is normally done directly with the support of processors virtualization methods, so the resources are accessed in an abstract and more secure way.Aalto University, T-110.5290 Seminar on Network Security Fall 2010 Grid computing needs to have multiple IDs while Cloud computing only needs one. In Grid computing, data integrity and confidentiality must be considered. Integrity is not normally mandatory in Cloud computing, since your information is already inside a virtualized environment, but confidentiality is necessary to prevent man-in-the-middle attacks. 4.2 Methods that can be used for both technologies Some methods that now a days are used by one of the technologies could be used in the future to make the other more secure. This is a very interesting issue due to the lack of testing that has been already done with Cloud Computing due to its youngness. Some possibilities will be given in this section:

As previously mentioned, the Trusted Computing Group(TGC) proposed the Trusted platform module(TPM), which is a chip with Private key and cryptographic algorithms, which are not rewritable. This method has been proposed to Cloud Computing but, since the same chip could be used in different domains of the Grid, using public key cryptography to secure the communication. Another thing that could be considered is the trust relationship management methods used in Grid computing. Now a days, since the APIs used by different Cloud providers are not common and since is not very feasible to combine multiple Cloud providers at the same time because of the lack of standard APIs, the trust relationship management is not necessary but if we think about the future, where Cloud providers agree to use common APIs and the possibility of sharing data and combining Clouds become possible, trust relationship management methods used in Grid could be useful for Cloud Computing as well.

5. Future of the Grid computing


What is grid in future? It is expected that in this world millions of pcs anywhere from Antarctica to Australia will be connected to one single network and everyone will be allowed to fully use the network in the way he desires. Also the computers will be of all kinds they could be laptops, iPods, pcs and supercomputers. As we dont care that the electricity we are using is coming from what place, one will also dont know that the network he is connected to is where but hell only take his work from that network. One will only pay for the grid hes receiving and the way hes using. Grid computing makes huge collection on data distribute all over the world, which provides great comfort to engineers and scientists, as they will use that from anywhere around the world so it will create the

situation as they are in their own office or laboratory. The grid computing could be also composed of small network. The whole network of grid computing could be made only for a single purpose too. A. Where Grid Computing Suffers The grid-computing network could consume more time in a situation in which some parts of a task are distributed among various machines because different machines have different characteristics like speed, capacity. If a machine is slow and others are relaying on its work then they have to wait which would waste time. Many issues like protein folding, financial modeling,earthquake simulation will be solved by help of grid computing in future. The grid technology works in both commercial and non-commercial fields.Also if a machines space is not enough then again errors will arise. Like if a C++ code is been made in network then if there is windows vista installed on any one pc will cause big problem as it does not supports the libraries of C++, so to use that machine the operating system will had to be changedwhich will waste a lot of time.A bug in one machine will not let it work properly. So the point is that a task should be distributed in different machines in the way

that they do not rely on each other.

Fig. 4: The Grid Computing Look In Various Fields Of World. Reference: www.grid.org 5.1. Existing systems Grid computing has many projects currently running in various fields like educational, scientific and technical computing. Well they are currently in the state of been at very starting level but they are rapidly going towards their goal. In industry the grid computing is expected to play a tremendous role. Also grid computing will affect the e-business and will make it a beauty. A. Globus In 1996 a project of grid computing named as Globus came into being. Many universities made a cooperative effort for the start of Globus. Actually the Globus was made for the purpose of making Grid

computing understandable for the people. For example if the complete environment of grid computing in network is available and one wants to run an application on that environment, then some queries come into being like the available assets for running his application correctly are strong enough to handle, the grid is configured properly, what is the security level of grid, when is the correct time to use grid, what tool will be used for exchanging the information with respect to grid and finally is the check been made on grid that makes sure that his work is been performed in the correct way and will lead his way to his goal. The Globus was founded to solve all these questions. B. Wista WISTA has some projects related to grid computing and for that purpose it is dealing with international organizations to analyze the grid computing. The real aim of WISTA is to use the grid computing for policies making of governments instead of technology related fields. C. Geophysics In the field of geophysics the grid computing is helping the scientists to research on the satellites and also a huge amount of data currently is been downloaded and shared through it.The physicists are using grid computing as it helps them to analyze the earth in a better way.

Fig. 5: Progress Of Grid Computing In World. Reference: Walter: Messen, Steuern, Regel mit ARM-Mikrocontrollern. FranzisVerlag 2004. D. Grid Computing Use In 3d World The 3D world of gaming has also been exaggerated by grid computing. A game naming there.com uses the environment similar to grid computing. In this game an attempt was made to present a situation in which a reality meeting is been held among humans. The platform used for the making of that game was grid computing. The maker of that game related that the idea of making that game with use of grid computing finished his game in a better and easy way then ordinary way of using the traditional server. He also stated that as the game consists of communication of humans by using that grid computing that process of

communication became simpler and easy. So it can be concluded from that game that the future of grid computing also looks cool in gaming zone of 3D graphics.ISSN : 0975-3397 1929

Fig. 6: Grid Computing Used In Game There.Com Reference: www.3dgamingzone.com\grid 5.2. Research areas in Grid computing A. Challenge The challenge today is to find a real system of grid computing in which task is distributed among different machines in which the resources are best utilized and the output is really very much efficient. The network should be good enough to handle problems that arise due to the lively characteristics of resources. A lot of research is been done for that purpose but still the required work is not fully achieved.As the idea of grid computing is very much similar to that of super computer, so research on supercomputers could introduce new ideas in the grid computing. It can be possible in future that grid computers network can make supercomputer a part of history due to their efficiency but it

requires a lot of research and is looking very far away to come in upcoming years. But finally it this technology will also come and will make the world to think at least one time of it. B. Grid Computing Concerning Researchers According to some of the researchers the grid computing is one of the ten topmost and great upcoming technologies of the world. The grid computing is given such importance due to some facts like the one is that grid computing has the power to effect the world as electricity when came into being has effected the world. C. How To Make Grid Compute Reinstate Internet The Internet gained popularity, as it was easy to access itand also its cost was very much affordable. That result the speed of Internet started increasing and that caused the users to take interest and also to boost. So if the grid has a dream to replace the Internet it has to make sure that the complexity of installing and maintaining the grid becomes easy for normal people. D. IBM Promotes Grid Computing One of the projects regarding grid computing is the World Community Grid. The purpose of the World Community Gridis to serve humanity by making a grid system that is largest of his type. IBM is providing the necessary tools for that project.Some tools are free softwares, procedural analysis and capability to build the communications. Also IBM is also agreed to provide its help for preservation, hosting and support for that project. E. Databases Grid computing can be used to watch out databases. But in that case also it requires a great research to make security of the grid computing strong

enough to handle hackers to gain access to data because some data is of great importance and its loss could cause horrible results. Also no one wants its privacy to be visible to other people. Another factor on the database is of the space, as databases need huge space to be kept. The speed also matters in this stage, as the data can be need to transferred to other place. All these areas of database dealing with grid computing can be improved by research.

F. Business World The business is looking to be effected by grid computing as the research is going on for the grid computing. The new projects related to grid computing have a lot of importance a sit is expected that they will play the same role in the economy of our world in 21st century like the one played by electricity in 20th century. Probably the economy of the world will have great impact by grid computing and will move many steps forward in a short time. G. Grid Computing After Short Time In the next two upcoming years it is been expected that in organizations and commercial sectors grid will be entered asEnterprise grids. Although the grid computing at that level will be limited and it would be used as some links to control external grids or can be used behind the firewalls. At that level better approach will be to use grid computing in Internets business. H. After Many Years Grid computing projects are in a stage of under development in the world. Several firms, certified organizations, educational universities and different researchers are interested in developing those projects. For example European community (EU) is supporting a grid computing task for the sake of high-energy physics, earth.

ISSN : 0975-3397 1930

Fig. 7: Grid Computing Can Hold Whole World. Reference: www.gridcomputing.com\world. National technology grid is sponsoring many projects of grid computing for peoples betterment. The grid engine software is been tried to invent by sun Microsystems. Grid computing is today used in National Science Foundations National Technology Grid, NASA information Power Grid, Pratt & Whitney, Bristol-Myers and Squibb Co. Grid computing after five years is expected to use for interfaces like gaming-zone broadband and a bit also in industrial zone. All that approaches will lead down the grid computing to get more importance then before and replace many of old technologies. I. Expected Destiny To Grid Computing The final goal of grid computing will be that it will become a necessary tool for business to get his success. It will provide new products and will help in communication between the organizations and the customers. Also the internet will completely buried away be the use of grid computing in the world. Grid computing if becomes strong enough to provide the real privacy and security to its user then it will be taken on in

the commercial zone. Also the grid computing has to provide easy and reasonably priced access to Internet. All that work is difficult but as nearly nothing is impossible in our world so grid computing will also able to fulfill his requirements in the future.

Fig. 8: Grid bus A Project Of Grid Computing. Reference:www.eece.unm.edu/~apm/docs/APM_GridRPC_0702.pdf

5.3. Present and future generation of Grids: Today, grid systems are still at the early stages of providing a reliable, well performing, and automatically recoverable virtual data sharing and storage. We will see products that take on this task in a grid setting, federating data of all kinds, and achieving better performance, integration with scheduling, reliability, and capacity.Autonomic

computing has the goal to make the administrators job easier by automating the various complicated tasks involved in managing a grid. These include identifying problems in real time and quickly initiating corrective actions before they seriously impair the grid. 6. Conclusions Lots of technologies are now a days on the market and some of them share their features. In this case, as it has been demonstrated, already existing security solutions can be used for other technologies. In addition, in some specific issues, new technologies can be more secure than older ones due to that the design of new solutions can be more suitable to avoid security problems and will make this task much easier. Relating to this matter, in this paper we demonstrated that technologies like the Trusted platform module(TPM) proposed by the Trusted Computing Group(TGC) can be used for Cloud computing as proposed but it can be used in different domains of Grid computing as well in order to secure communication through public key cryptography. On the other hand, looking into the future, we considered using trust relationship management methods, like the ones used in Grid computing, to be used in Cloud Computing when building common APIs that allow the of sharing data between Cloud providers. Trust must, therefore, be considered between the Cloud providers.

7. Future work Security problems are basic problems of Grid Computing System. Research on security is hot spot and tough spot of research on Grid Computing System. We define a new set of security policy and give the representation. Our security policy is not ideal and we will develop our security policy. We will do our research of Grid Portal and Grid applications and implement this security policy on our test bed which consists of multi management domains. Considering the existing Grid security policy, we will also extend authentication and authorization

model of distributed system and define Grid Security Policy Layer in order to solve the problems of authentication and authorization in multi domain. Today, grid systems are still at the early stages of providing a reliable, well performing, and automatically recoverable virtual data sharing and storage. We will see products that take on this task in a grid setting, federating data of all kinds, and achieving better performance, integration with scheduling, reliability, and capacity. Autonomic computing has the goal to make the administrators job easier by automating the various complicated tasks involved in managing a grid. These include identifying problems in real time and quickly initiating corrective actions before they seriously impair the grid. As mentioned, one of the reasons that people may not want to make their computer available on a Grid is that they do not trust other users to run code on their machines. Within small scale Grids this is not too much of a problem as Virtual Organizations at least partially eliminate the fear of malicious attacks. This is because in a Virtual Organization you can authorize only those from within a certain trusted organization to be able to access your computer. However, there could potentially be problems with the authorization systems and it is possible that someone from within the organization could act in a malicious way. With larger scale Grids it will be impossible to know and trust everyone who can access a single computer so the Grid infrastructure will have to provide guarantees of security in some way. The Java Sandbox Security Model already provides an environment in which non reliable users are restricted from making certain system calls which are not considered safe, and from accessing memory addresses outside of a certain range. Any Grid system will have to provide a similar mechanism, so that users will be happy to let others access their computer.

References
TEXTBOOKS: GRID COMPUTING A Research Monograph by D JANAKIRAM GRID COMPUTING for DEVELOPERS by VLADIMIR SILVA Introduction to GRID COMPUING with Globus By IBM.com/redbooks

WEBSITES: AN INTERNATIONAL WORK SHOP PAPER ON Security Implications of Typical Grid Computing Usage Scenarios byMarty Humphrey, Mary R. Thompson http://www.wikipedia.com/ www.amazon.com www.grid.org www.ibm.com/redbooks

1.Foster, I.; Yong Zhao; Raicu, I.; Lu, S. Cloud Computing and Grid Computing 360-Degree Com- pared. Grid Computing Environments Workshop, 2008. GCE 08 , vol., no., pp.1-10, 12-16 Nov. 2008. http://people.cs.uchicago.edu/ ~iraicu/publications/2008_GCE08_ Clouds_Grids.pdf. 2.Judith M. Myerson .Cloud computing versus grid computing. March 2009. EECS Department.University of California, Berkeley. Technical Report No.UCB/EECS-2009-28. http://www.eecs.berkeley.edu/Pubs/ TechRpts/2009/EECS-2009-28.html.

Potrebbero piacerti anche