Loading…

Security principles for public-resource modeling research

Large-scale distributed computing projects have many security concerns due to their public and often "open" nature. Climateprediction.net (CPDN) is taking the concept of public-resource, high-throughput grid computing a stage further, by using it for a major piece of modeling research. The...

Full description

Saved in:
Bibliographic Details
Main Authors: Stainforth, D., Martin, A., Simpson, A., Christensen, C., Kettleborough, J., Aina, T., Allen, M.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 324
container_issue
container_start_page 319
container_title
container_volume
creator Stainforth, D.
Martin, A.
Simpson, A.
Christensen, C.
Kettleborough, J.
Aina, T.
Allen, M.
description Large-scale distributed computing projects have many security concerns due to their public and often "open" nature. Climateprediction.net (CPDN) is taking the concept of public-resource, high-throughput grid computing a stage further, by using it for a major piece of modeling research. The aim is to harness the spare CPU cycles of potentially millions of individual users' PCs to run a massive ensemble of climate simulations. In doing so it has been faced with a range of security and integrity issues beyond those encountered by previous projects but likely also to confront similar initiatives in the future. This paper introduces the project and its software architecture, and outlines a threat model for such situations, including threats to participants, threats to the experiment and threats to other stakeholders. It goes on to discuss how these threats have been addressed, with the procedures presented expected to form a valuable foundation for an increasing number of similar projects.
doi_str_mv 10.1109/ENABL.2004.54
format conference_proceeding
fullrecord <record><control><sourceid>pascalfrancis_CHZPO</sourceid><recordid>TN_cdi_pascalfrancis_primary_17564634</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1376853</ieee_id><sourcerecordid>17564634</sourcerecordid><originalsourceid>FETCH-LOGICAL-i205t-e31eb55935defd181056a63f5a5bdee0cb66e5520c2113c5ff499e42922744a33</originalsourceid><addsrcrecordid>eNpFj71PwzAUxC0-JNLCyMSShTHBz_Zz4rFU5UOKYADmynGewShtIrsd-t83UpGYTrr76XTH2C3wEoCbh9Xb4rEpBeeqRHXGMqEVFDVoc85mvNIGBdQSL1gGKFShUFVXbJbSL-dSK11lzHyQ28ewO-RjDFsXxp5S7oeYj_u2D66IlIZ9dJRvho76sP3OJ4dsdD_X7NLbPtHNn87Z19Pqc_lSNO_Pr8tFUwTBcVeQBGoRjcSOfAc1cNRWS48W246Iu1ZrQhTcCQDp0HtlDClhhKiUslLO2f2pd7TJ2d5HO81M62nuxsbDGiqcnkg1cXcnLhDRfywrXaOUR9fDVIQ</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Security principles for public-resource modeling research</title><source>IEEE Xplore All Conference Series</source><creator>Stainforth, D. ; Martin, A. ; Simpson, A. ; Christensen, C. ; Kettleborough, J. ; Aina, T. ; Allen, M.</creator><creatorcontrib>Stainforth, D. ; Martin, A. ; Simpson, A. ; Christensen, C. ; Kettleborough, J. ; Aina, T. ; Allen, M.</creatorcontrib><description>Large-scale distributed computing projects have many security concerns due to their public and often "open" nature. Climateprediction.net (CPDN) is taking the concept of public-resource, high-throughput grid computing a stage further, by using it for a major piece of modeling research. The aim is to harness the spare CPU cycles of potentially millions of individual users' PCs to run a massive ensemble of climate simulations. In doing so it has been faced with a range of security and integrity issues beyond those encountered by previous projects but likely also to confront similar initiatives in the future. This paper introduces the project and its software architecture, and outlines a threat model for such situations, including threats to participants, threats to the experiment and threats to other stakeholders. It goes on to discuss how these threats have been addressed, with the procedures presented expected to form a valuable foundation for an increasing number of similar projects.</description><identifier>ISSN: 1524-4547</identifier><identifier>ISBN: 0769521835</identifier><identifier>ISBN: 9780769521831</identifier><identifier>EISSN: 2641-8169</identifier><identifier>DOI: 10.1109/ENABL.2004.54</identifier><language>eng</language><publisher>Los Alamitos CA: IEEE</publisher><subject>Applied sciences ; Computational modeling ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Distributed computing ; Exact sciences and technology ; Grid computing ; Large-scale systems ; Personal communication networks ; Security ; Software ; Software architecture</subject><ispartof>13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2004, p.319-324</ispartof><rights>2006 INIST-CNRS</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1376853$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54555,54920,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1376853$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=17564634$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Stainforth, D.</creatorcontrib><creatorcontrib>Martin, A.</creatorcontrib><creatorcontrib>Simpson, A.</creatorcontrib><creatorcontrib>Christensen, C.</creatorcontrib><creatorcontrib>Kettleborough, J.</creatorcontrib><creatorcontrib>Aina, T.</creatorcontrib><creatorcontrib>Allen, M.</creatorcontrib><title>Security principles for public-resource modeling research</title><title>13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises</title><addtitle>ENABL</addtitle><description>Large-scale distributed computing projects have many security concerns due to their public and often "open" nature. Climateprediction.net (CPDN) is taking the concept of public-resource, high-throughput grid computing a stage further, by using it for a major piece of modeling research. The aim is to harness the spare CPU cycles of potentially millions of individual users' PCs to run a massive ensemble of climate simulations. In doing so it has been faced with a range of security and integrity issues beyond those encountered by previous projects but likely also to confront similar initiatives in the future. This paper introduces the project and its software architecture, and outlines a threat model for such situations, including threats to participants, threats to the experiment and threats to other stakeholders. It goes on to discuss how these threats have been addressed, with the procedures presented expected to form a valuable foundation for an increasing number of similar projects.</description><subject>Applied sciences</subject><subject>Computational modeling</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Distributed computing</subject><subject>Exact sciences and technology</subject><subject>Grid computing</subject><subject>Large-scale systems</subject><subject>Personal communication networks</subject><subject>Security</subject><subject>Software</subject><subject>Software architecture</subject><issn>1524-4547</issn><issn>2641-8169</issn><isbn>0769521835</isbn><isbn>9780769521831</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2004</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNpFj71PwzAUxC0-JNLCyMSShTHBz_Zz4rFU5UOKYADmynGewShtIrsd-t83UpGYTrr76XTH2C3wEoCbh9Xb4rEpBeeqRHXGMqEVFDVoc85mvNIGBdQSL1gGKFShUFVXbJbSL-dSK11lzHyQ28ewO-RjDFsXxp5S7oeYj_u2D66IlIZ9dJRvho76sP3OJ4dsdD_X7NLbPtHNn87Z19Pqc_lSNO_Pr8tFUwTBcVeQBGoRjcSOfAc1cNRWS48W246Iu1ZrQhTcCQDp0HtlDClhhKiUslLO2f2pd7TJ2d5HO81M62nuxsbDGiqcnkg1cXcnLhDRfywrXaOUR9fDVIQ</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Stainforth, D.</creator><creator>Martin, A.</creator><creator>Simpson, A.</creator><creator>Christensen, C.</creator><creator>Kettleborough, J.</creator><creator>Aina, T.</creator><creator>Allen, M.</creator><general>IEEE</general><general>IEEE Computer Society Press</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope><scope>IQODW</scope></search><sort><creationdate>2004</creationdate><title>Security principles for public-resource modeling research</title><author>Stainforth, D. ; Martin, A. ; Simpson, A. ; Christensen, C. ; Kettleborough, J. ; Aina, T. ; Allen, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i205t-e31eb55935defd181056a63f5a5bdee0cb66e5520c2113c5ff499e42922744a33</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Applied sciences</topic><topic>Computational modeling</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Distributed computing</topic><topic>Exact sciences and technology</topic><topic>Grid computing</topic><topic>Large-scale systems</topic><topic>Personal communication networks</topic><topic>Security</topic><topic>Software</topic><topic>Software architecture</topic><toplevel>online_resources</toplevel><creatorcontrib>Stainforth, D.</creatorcontrib><creatorcontrib>Martin, A.</creatorcontrib><creatorcontrib>Simpson, A.</creatorcontrib><creatorcontrib>Christensen, C.</creatorcontrib><creatorcontrib>Kettleborough, J.</creatorcontrib><creatorcontrib>Aina, T.</creatorcontrib><creatorcontrib>Allen, M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library Online</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Stainforth, D.</au><au>Martin, A.</au><au>Simpson, A.</au><au>Christensen, C.</au><au>Kettleborough, J.</au><au>Aina, T.</au><au>Allen, M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Security principles for public-resource modeling research</atitle><btitle>13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises</btitle><stitle>ENABL</stitle><date>2004</date><risdate>2004</risdate><spage>319</spage><epage>324</epage><pages>319-324</pages><issn>1524-4547</issn><eissn>2641-8169</eissn><isbn>0769521835</isbn><isbn>9780769521831</isbn><abstract>Large-scale distributed computing projects have many security concerns due to their public and often "open" nature. Climateprediction.net (CPDN) is taking the concept of public-resource, high-throughput grid computing a stage further, by using it for a major piece of modeling research. The aim is to harness the spare CPU cycles of potentially millions of individual users' PCs to run a massive ensemble of climate simulations. In doing so it has been faced with a range of security and integrity issues beyond those encountered by previous projects but likely also to confront similar initiatives in the future. This paper introduces the project and its software architecture, and outlines a threat model for such situations, including threats to participants, threats to the experiment and threats to other stakeholders. It goes on to discuss how these threats have been addressed, with the procedures presented expected to form a valuable foundation for an increasing number of similar projects.</abstract><cop>Los Alamitos CA</cop><pub>IEEE</pub><doi>10.1109/ENABL.2004.54</doi><tpages>6</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1524-4547
ispartof 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2004, p.319-324
issn 1524-4547
2641-8169
language eng
recordid cdi_pascalfrancis_primary_17564634
source IEEE Xplore All Conference Series
subjects Applied sciences
Computational modeling
Computer science
control theory
systems
Computer systems and distributed systems. User interface
Distributed computing
Exact sciences and technology
Grid computing
Large-scale systems
Personal communication networks
Security
Software
Software architecture
title Security principles for public-resource modeling research
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T02%3A28%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Security%20principles%20for%20public-resource%20modeling%20research&rft.btitle=13th%20IEEE%20International%20Workshops%20on%20Enabling%20Technologies:%20Infrastructure%20for%20Collaborative%20Enterprises&rft.au=Stainforth,%20D.&rft.date=2004&rft.spage=319&rft.epage=324&rft.pages=319-324&rft.issn=1524-4547&rft.eissn=2641-8169&rft.isbn=0769521835&rft.isbn_list=9780769521831&rft_id=info:doi/10.1109/ENABL.2004.54&rft_dat=%3Cpascalfrancis_CHZPO%3E17564634%3C/pascalfrancis_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i205t-e31eb55935defd181056a63f5a5bdee0cb66e5520c2113c5ff499e42922744a33%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1376853&rfr_iscdi=true