A Methodology for Account Management in Grid Computing Environments

  • Thomas J. Hacker
  • Brian D. Athey
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2242)


A national infrastructure of Grid computing environments will provide access for a large pool of users to a large number of distributed computing resources. Providing access for the complete pool of potential users would put an unacceptably large administrative burden on sites that participate in the Grid. Current approaches to solve this problem require an account for each user at a site, or maps all users into one account. This paper proposes an alternative approach to account allocation that provides the benefits of persistent accounts while minimizing the administrative burden on Grid resource providers. A technique for calculating the upper bound on the number of jobs and users offered to the system from the Grid that is based on historical use is presented. Finally, application of this approach to the National Institutes of Health Visible Human Project is described.


Arrival Rate Busy Period Peak Number Local Account Grace Period 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    I. Foster, C. Kesselman (editors), The Grid: Blueprint for a New Computing Infrastructure, Morgan Kauffman Publishers, 1999.Google Scholar
  2. 2.
    R. Housley, W. Ford, W. Polk, D. RFC 2459 “Internet X.509 Public Key Infrastructure Certificate and CRL Profile”, January 1999.Google Scholar
  3. 3.
    D. H. J Epema, M. Livny, R. van Dantzig, X. Evers, and J. Pruyne, “A Worldwide Flock of Condors: Load Sharing among Workstation Clusters”, Journal on Future Generations of Computer Systems Volume 12, 1996.Google Scholar
  4. 4.
    N. Kapadia and J. Fortes, “PUNCH: An Architecture for Web-Enabled Wide-Area Network-Computing”, Cluster Computing: The Journal of Networks, Software Tools and Applications, September 1999.Google Scholar
  5. 5.
    B. Doster, J. Rees, “Third-Party “Authentication for the Institutional File System”, University of Michigan CITI Technical Report 92-1.Google Scholar
  6. 6.
    I. Foster, C. Kesselman, C, “Globus: A Metacomputing Infrastructure Toolkit”, International Journal of Supercomputing Applications, 11(2): 115–128, 1997.Google Scholar
  7. 7.
    T. Hacker, W. Thigpen, “Distributed Accounting on the Grid”, Grid Forum Working Draft.Google Scholar
  8. 8.
    R. Buyya, D. Abramson, J. Giddy, “An Economy Grid Architecture for Service-Oriented Grid Computing”, 10th IEEE International Heterogeneous Computing Workshop,April 2001.Google Scholar
  9. 9.
    R. Wolff, Stochastic Modeling and the Theory of Queues. Prentice Hall, 1989.Google Scholar
  10. 10.
    V. Paxson, S. Floyd, “Wide-area Traffic: The Failure of Poisson Modeling”, IEEE/ACM Transactions on Networking, pp.226–244, June 1995.Google Scholar
  11. 11.
    3 Point Technologies, Inc. Qsim Modeling Functions for Excel.Google Scholar
  12. 12.
    S. Qiao, L. Qiao, “A Robust and Efficient Algorithm for Evaluating Erlang B Formula”, TR CAS98-03, Department of Computing and Software, McMaster University, 1998.Google Scholar
  13. 13.
    J. Green, The Irwin Handbook of Telecommunications Management. Irwin Professional Publishing, 1996.Google Scholar
  14. 14.
    Intel Support Document #8150:A Traffic Engineering Model for LAN Video Conferencing.Google Scholar
  15. 15.
    M. Thompson, W. Johnston, S. Mudumbai, G. Hoo, K. Jackson, Essiari, “A. Certificate-based Access Control for Widely Distributed Resource”,. Proceedings of the Eighth Usenix Security Symposium, Aug.’ 1999.Google Scholar
  16. 16.
    M. J. Ackerman, “The Visible Human Project,” J. Biocomm., vol. 18, p 14, 1991.Google Scholar
  17. 17.
    I. Foster, C. Kesselman, S. Tuecke, “The Anatomy of the Grid: Enabling Scalable Virtual Organizations.” (to be published in Intl. J. Supercomputer Applications, 2001).Google Scholar
  18. 18.
    R. Butler, D. Engert, I. Foster, C. Kesselman, S. Tuecke, J. Volmer, V. Welch. “A National-Scale Authentication Infrastructure.” IEEE Computer, 33(12):60–66, 2000.CrossRefGoogle Scholar
  19. 19.
    M. Blaze, J. Feigenbaum, A. Keromytis. “KeyNote Trust-Management System”, RFC 2704Google Scholar
  20. 21.
    W. Doster, M. Watts, D. Hyde. “The KX.509 Protocol”, CITI Technical Report 012, February 2001.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Thomas J. Hacker
    • 1
  • Brian D. Athey
    • 2
  1. 1.Center for Parallel ComputingUniversity of MichiganAnn ArborUSA
  2. 2.Cell & Developmental BiologyUniversity of MichiganAnn ArborUSA

Personalised recommendations