ANALYSIS OF MODERN METHODS OF INFORMATION PROTECTION IN GRID SYSTEMS WHEN CONDUCTING STATE EXPERTISE OF CIPS

Authors

DOI:

https://doi.org/10.32782/IT/2025-1-32

Keywords:

grid systems, state expertise, comprehensive information protection systems, Globus GSI, information security.

Abstract

The article investigates modern methods of ensuring information security in grid systems, which are the basis for the state examination of integrated information security systems (IIS). The methodology of the work consists in the use of grid systems, which play an important role in solving complex computing tasks requiring significant resources. They allow to integrate the capacities of computing centers and distribute workloads between them. However, such a structure creates new security challenges, in particular, in terms of protecting data and resources from unauthorized access, breach of integrity and confidentiality. The purpose of the article is to review and improve the mechanisms that provide protection in grid systems, in particular, the Globus Grid Security Infrastructure (GSI), which is based on public key technology. Its key components are described: authentication and authorization protocols, mechanisms for transferring access rights, support for one-time authentication and the use of X.509 proxy certificates. Particular attention is paid to messagelevel security using the WS-Security standard and the SAML language for exchanging access rights data.

References

Simple Object Access Protocol (SOAP) 1.1. W3C, Note 8, 2000.

CMS Requirements for the Grid : Proc. of the Int. Conf. on Computing in High Energy and Nuclear Physics (CHEP2001). K. Holtman. URL: citeseer.ist.psu.edu/article/holtman01cms.html.

Foster I., Kesselman C., Tuecke S. The Anatomy of the Grid. Enabling Scalable Virtual Organizations. International Journal of Supercomputer Applications, 2001. 15(3), 200–222.

Cornwall L. A., Jensen J., Kelsey D. P. Authentication and Authorization Mechanisms for Multi-Domain Grid Environments. Journal of Grid Computing, 2004. 9, 301–311.

A Security Architecture for Computational Grids: Proc. of ACM Conf. on Computers and Security / Foster, I., Kesselman, C., Tsudik, G., Tuecke, S. 1998. P. 83–91.

Adams C., Lloyd S. Understanding PKI: Concepts, Standards, and Deployment Considerations. London, Addison-Wesley. 2002.

IETF – Public-Key Infrastructure (X.509) (pkix), 2005. URL: www.tools.ietf.org/wg/pkix

IETF – Transport Layer Security (tls), 2005. URL: www.tools.ietf.org

Tulloch M. Microsoft Encyclopedia of Security. Redmond, Washington: Microsoft Press. 2003.

Kalmady R., Sonvane D., Bhatt K. GridView: A Grid Monitoring and Visualization Tool. 2009. URL: https://twiki.cern.ch/twiki/pub/LCG/GridView/

Published

2025-04-30