Security Issues in Virtual Grid Environments

  • Jose L. Muñoz
  • Josep Pegueroles
  • Jordi Forné
  • Oscar Esparza
  • Miguel Soriano
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3038)


Computational Grids (or simply Grids) enable access to a large number of resources typically including processing, memory, and storage devices. Usually, Grids are used for running very specific applications (most of them related to some kind of scientific hard problem); however, not much attention has been paid to commercial Grid applications. The massive use of such commercial services will depend on fulfilling their special security, usability and quality of service requirements. In this sense, Virtual Private Grid (VPG) provides a way of dynamically create a virtual grid environment with dedicated network resources. In this paper VPG is compared with related work such as the Grid over VPN (GoVPN), the Grid Community (GC) and the Ad-hoc Grid (AG) and the security challenges for VPGs are analyzed.


Network Level Multicast Group Grid Environment Grid Level Grid Community 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Ballenson, D., McGrew, D., Sherman, A.: Key Management for Large Dynamic Groups: OneWay Function Trees and Amortized Initialization. Internet Draft (2000) (work in progress)Google Scholar
  2. 2.
    Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: A taxonomy and some efficient constructions. In: INFOCOMM 1999 (1999)Google Scholar
  3. 3.
    Figueiredo, R., Dinda, P., Fortes, J.: A case for grid computing on virtual machines. In: International Conference on Distributed Computing Systems (ICDCS), May 2003, pp. 550–559. IEEE Computer Society, Los Alamitos (2003)Google Scholar
  4. 4.
    Figueiredo, R.J.: Vp/gfs: an architecture for virtual private grid file systems. Technical Report TR-ACIS-03-001, University of Florida (May 2003)Google Scholar
  5. 5.
    Foster, I., Kesselman, C.: The Grid. Blueprint for a new computing infrastructure. Morgan Kaufmann, San Francisco (1999)Google Scholar
  6. 6.
    Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the Grid. International Journal of Supercomputer Applications 15(3), 200–222 (2001)CrossRefGoogle Scholar
  7. 7.
    Foster, I.T., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for computational grids. In: ACM Conference on Computer and Communications Security, pp. 83–92 (1998)Google Scholar
  8. 8.
    Harney, H., Harder, E.: Logical Key Hierarchy Protocol (1999) Internet Draft (work in progress)Google Scholar
  9. 9.
    Kaneda, K., Taura, K., Yonezawa, A.: Virtual private grid: a command shell for utilizing hundreds of machines efficiently. Future Generation Computer Systems 19(4), 563–573 (2003)CrossRefGoogle Scholar
  10. 10.
    Lorch, M., Kafura, D.: Supporting secure ad-hoc user collaboration in grid environments. In: Parashar, M. (ed.) GRID 2002. LNCS, vol. 2536, pp. 181–193. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  11. 11.
    Pearlman, L., Welch, V., Foster, I., Kesselman, C.: A community authorization service for group collaboration. In: IEEE Third International Workshop on Policies for Distributed Systems and Networks, June 2002, pp. 50–59 (2002)Google Scholar
  12. 12.
    Pegueroles, J., Bin, W., Soriano, M., Rico-Novella, F.: Group rekeying algorithm using pseudo-random functions and modular reduction. In: Li, M., Sun, X.-H., Deng, Q.-n., Ni, J. (eds.) GCC 2003. LNCS, vol. 3032, pp. 875–882. Springer, Heidelberg (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Jose L. Muñoz
    • 1
  • Josep Pegueroles
    • 1
  • Jordi Forné
    • 1
  • Oscar Esparza
    • 1
  • Miguel Soriano
    • 1
  1. 1.Telematics Engineering Department (ENTEL)Technical University of Catalonia (UPC)BarcelonaSpain

Personalised recommendations