FP6−2004−Infrastructures−6-SSA-026634 CNGrid Middleware GOSv2 Yongjian Wang BUAA – Beijing, China Interoperability workshop of euchinagrid Beijing, 12-14.

Slides:



Advertisements
Similar presentations
System Software Overview of China National Grid VEGA R&D Team, Research Centre for Grid and Service Computing, ICT, CAS.
Advertisements

Policy Based Dynamic Negotiation for Grid Services Authorization Infolunch, L3S Research Center Hannover, 29 th Jun Ionut Constandache Daniel Olmedilla.
Tuesday, June 10, 2003 Web Services Brief Overview & Security Assertion Coordinator Pattern by Mohammad Abushadi & Riaz Ahmed for Security Group CSE -
MyProxy: A Multi-Purpose Grid Authentication Service
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 12 Slide 1 Distributed Systems Design 2.
High Performance Computing Course Notes Grid Computing.
The Community Authorisation Service – CAS Dr Steven Newhouse Technical Director London e-Science Centre Department of Computing, Imperial College London.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
G O B E Y O N D C O N V E N T I O N WORF: Developing DB2 UDB based Web Services on a Websphere Application Server Kris Van Thillo, ABIS Training & Consulting.
GGF Toronto Spitfire A Relational DB Service for the Grid Peter Z. Kunszt European DataGrid Data Management CERN Database Group.
Copyright B. Wilkinson, This material is the property of Professor Barry Wilkinson (UNC-Charlotte) and is for the sole and exclusive use of the students.
Systems Architecture, Fourth Edition1 Internet and Distributed Application Services Chapter 13.
Peoplesoft: Building and Consuming Web Services
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
Client/Server Software Architectures Yonglei Tao.
Introduction to CNGrid GOS 3.0 OMII-Euro & CNGrid Joint Training Material 刘杰 (Liu Jie) Jan
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
1 Secure Distributed Objects for Grid Applications Laurent Baduel, Arnaud Contes, Denis Caromel OASIS team ProActive
Identity Management Report By Jean Carreon and Marlon Gonzales.
TeraGrid Science Gateways: Scaling TeraGrid Access Aaron Shelmire¹, Jim Basney², Jim Marsteller¹, Von Welch²,
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
GT Components. Globus Toolkit A “toolkit” of services and packages for creating the basic grid computing infrastructure Higher level tools added to this.
Indo-US Workshop, June23-25, 2003 Building Digital Libraries for Communities using Kepler Framework M. Zubair Old Dominion University.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
COMP3019 Coursework: Introduction to GridSAM Steve Crouch School of Electronics and Computer Science.
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
National Computational Science National Center for Supercomputing Applications National Computational Science NCSA-IPG Collaboration Projects Overview.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
The VEGA Approach to Grid Security Grid System Software Group, ICT, CAS Security In VEGA GOS v2 Li ZHA
10/25/20151 Single Sign-On Web Service Supervisors: Viktor Kulikov Alexander Sherman Liana Lipstov Pavel Bilenko.
Communicating Security Assertions over the GridFTP Control Channel Rajkumar Kettimuthu 1,2, Liu Wantao 3,4, Frank Siebenlist 1,2 and Ian Foster 1,2,3 1.
Tutorial: Building Science Gateways TeraGrid 08 Tom Scavo, Jim Basney, Terry Fleury, Von Welch National Center for Supercomputing.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
June 24-25, 2008 Regional Grid Training, University of Belgrade, Serbia Introduction to gLite gLite Basic Services Antun Balaž SCL, Institute of Physics.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Grid Security: Authentication Most Grids rely on a Public Key Infrastructure system for issuing credentials. Users are issued long term public and private.
Scalable Grid system– VDHA_Grid: an e-Science Grid with virtual and dynamic hierarchical architecture Huang Lican College of Computer.
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
DIS PROPOSAL - Distributed Data Warehouse - R 蔣孟儒 R 龍秋明.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
Glite. Architecture Applications have access both to Higher-level Grid Services and to Foundation Grid Middleware Higher-Level Grid Services are supposed.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 JSP Application Models.
REST By: Vishwanath Vineet.
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
Globus Data Storage Interface (DSI) - Enabling Easy Access to Grid Datasets Raj Kettimuthu, ANL and U. Chicago DIALOGUE Workshop August 2, 2005.
Securing Web Applications Lesson 4B / Slide 1 of 34 J2EE Web Components Pre-assessment Questions 1. Identify the correct return type returned by the doStartTag()
Expense Tracking System Developed by: Ardhita Maharindra Muskan Regmi Nir Gurung Sudeep Karki Tikaprem Gurung Date: December 05 th, 2008.
DEVELOPING WEB SERVICES WITH JAVA DESIGN WEB SERVICE ENDPOINT.
EMI is partially funded by the European Commission under Grant Agreement RI Common Authentication Library Daniel Kouril, for the CaNL PT EGI CF.
FP6−2004−Infrastructures−6-SSA Interoperability Task in EUChinaGrid Project Giuseppe Andronico INFN Sez. Di Catania OGF 20 - GIN Manchester,
Gang Chen, Institute of High Energy Physics Feb. 27, 2012, CHAIN workshop,Taipei Co-ordination & Harmonisation of Advanced e-Infrastructures Research Infrastructures.
6/28/ A global mesh of interconnected networks (internetworks) meets these human communication needs. Some of these interconnected networks are.
European and Chinese Cooperation on Grid CNGrid GOS China National Grid System Software Zhiwei Xu, Taoying Liu ICT, CAS.
ESRIN, 15 July 2009 Slide 1 Web Service Security support in the SSE Toolbox HMA-T Phase 2 FP 14 December 2009 S. Gianfranceschi, Intecs.
FP6−2004−Infrastructures−6-SSA Migrate GOS to IPv6 Beihang University Yongjian Wang.
Instructor Materials Chapter 5 Providing Network Services
StoRM: a SRM solution for disk based storage systems
WEB SERVICES.
Chapter 2: System Structures
Server Concepts Dr. Charles W. Kann.
THE STEPS TO MANAGE THE GRID
Chapter 3: Windows7 Part 4.
Computer Network Information Center, Chinese Academy of Sciences
Presentation transcript:

FP6−2004−Infrastructures−6-SSA CNGrid Middleware GOSv2 Yongjian Wang BUAA – Beijing, China Interoperability workshop of euchinagrid Beijing, June 2006

Yongjian Wang BUAA Bejiing, June 2006 Outline  Brief introduction to GOSv2  Overall architecture of GOSv2  Core Level Services  System/Application Level Services

Yongjian Wang BUAA Bejiing, June 2006 Brief introduction to GOSv2

Yongjian Wang BUAA Bejiing, June 2006 Outline  Brief introduction of GOSv2 Background Goals Research

Yongjian Wang BUAA Bejiing, June 2006 Backgrounds of GOSv2  Grid related research begins since 1999 in China  Part of the Grid Software program supported by the China Ministry of Science and Technology 863 program between 2002 and 2005

Yongjian Wang BUAA Bejiing, June 2006 Goals of GOSv2  Support multiple geographical distributed grid nodes such as super computing centers across China  Sharing mechanism and framework on computing, data, software and combined resources  Provide secured, uniformed and friendly interfaces accessing the scientific computing and information services

Yongjian Wang BUAA Bejiing, June 2006 Research  Focus on 4 key issues to satisfy common requirements: Naming mechanism Process or states maintain Virtual organization Programming model  Focus on implementing architecture, not protocols or services Use Computer System Approach, not middleware or network Use Service Oriented Architecture concept

Yongjian Wang BUAA Bejiing, June 2006 Overall Architecture of GOSv2

Yongjian Wang BUAA Bejiing, June 2006 Outline  Overall architecture of GOSv2 GOSv2 architecture  GOSv2 architecture EVP address spaces  Effective address space  Physical address space  Virtual address space Security mechanism

Yongjian Wang BUAA Bejiing, June 2006 GOSv2 Overall Architecture

Yongjian Wang BUAA Bejiing, June 2006 GOSv2 Architecture

Yongjian Wang BUAA Bejiing, June 2006 GOSv2 Architecture

Yongjian Wang BUAA Bejiing, June 2006 GOSv2 Architecture ( Runtime )

Yongjian Wang BUAA Bejiing, June 2006 EVP address space

Yongjian Wang BUAA Bejiing, June 2006 EVP address spaces  EVP provides three separate naming spaces effective address space Effective address space is used to logically categorized services Examples of effective address: eres://agora1:metaservice All addresses in this space with a prefix eres which is short for effective address physical address space Physical address space used to actually identify physical services Format of physical address is normal URL just as follows: virtual address space Virtual address space used to map effective address to physical address Virtual address used inside GOSv2 environment and starts with prefix vres://  Physical resource can enter or exit dynamically because effective and virtual address can hides the differences.

Yongjian Wang BUAA Bejiing, June 2006 EVP address spaces

Yongjian Wang BUAA Bejiing, June 2006 Security Mechanism in GOSv2

Yongjian Wang BUAA Bejiing, June 2006 Terms in use  User certificate X.509 certificate signed by CNGrid CA  User proxy certificate User proxy certificate is usually a session certificate with short live time. X.509 proxy certificate signed by user, delegate all or part of its owner’s authority Motivation of user proxy certificate is single login  SAML authorization token SAML Token contains attribute entries as description of authorization  GOSContext Java Object contains user proxy certificate and assert token

Yongjian Wang BUAA Bejiing, June 2006 X.509 Certificate format

Yongjian Wang BUAA Bejiing, June 2006

User Proxy Certificate Format  User proxy certificate consist of three different parts: CA’s X.509 certificate User’s X.509 certificate User’s private Key

Yongjian Wang BUAA Bejiing, June 2006 User Proxy Certificate

Yongjian Wang BUAA Bejiing, June 2006

SAML based authorization token

Yongjian Wang BUAA Bejiing, June 2006 Features of security mechanism  Transport layer SSL/TLS specification  Message layer WS-Security specification

Yongjian Wang BUAA Bejiing, June 2006 Axis handler chains mechanism  Axis handler chains adopt the chains of responsibility design pattern. Divide whole function such as security into a chain of small portions Every portion implements different sub-function Portions have no relationships among one another  Based on axis handler chains mechanism Add new function or remove old function are very easy Security mechanism doesn’t invade into concrete application Grip application can use or don’t use security mechanism just by modifying the configuration file.

Yongjian Wang BUAA Bejiing, June 2006 Security handlers in GOSv2 SignHandler Sign body of soap message and add ws-security soap header AddHandler Add GOSContext Object as soap attachment WSSecurityHandler Verify ws-security soap header GetAttachmentsHandler Get GOSContext Object from attachment of soap message VerifyCertsHandler Verify user certificate contained in GOSContext VerifyTokenHandler Verify token contained in GOSContext ACHandler Access control operation based on different policies

Yongjian Wang BUAA Bejiing, June 2006 Security Handler Chain

Yongjian Wang BUAA Bejiing, June 2006 Authentication & Authorization  Authentication Agora service – Provide resource management, user management and so on – Convert username and password to corresponding proxy and token  Authorization SAML Authorization Token – Subject Requester Agora Information Requester Role Information on Agora Server DN of requester – Action Operations of Requested Service

Yongjian Wang BUAA Bejiing, June 2006 Security mechanism

Yongjian Wang BUAA Bejiing, June 2006

Core Level Services of GOSv2

Yongjian Wang BUAA Bejiing, June 2006 Outline  Core Level Services Agora Service User Management Service Resource Management Service Security authentication and authorization Grip Service Grip Container Grip Struct Router Service Overlay network approach for resource management and locating Resource discovery in GOSv2

Yongjian Wang BUAA Bejiing, June 2006 Agora Service

Yongjian Wang BUAA Bejiing, June 2006 GOSv2 Architecture

Yongjian Wang BUAA Bejiing, June 2006 Functions of Agora Service  Role based grid user management Both external and internal user name Proxy certificates management  Service oriented resource management Mapping effective resource to virtual resource Currently using random resource selection algorithm  Token based authorization and access control management Multi-granularity SAML based and decoupled

Yongjian Wang BUAA Bejiing, June 2006 Architecture of Agora Service

Yongjian Wang BUAA Bejiing, June 2006 Grip Service

Yongjian Wang BUAA Bejiing, June 2006 GOSv2 Architecture

Yongjian Wang BUAA Bejiing, June 2006 Grip Service  Grip Service maintains state information for end user. Grip Container Exposed as Web Service Grip Struct is used to invoke different physical services on behalf of end user Used to access underlying physical service

Yongjian Wang BUAA Bejiing, June 2006 Grip Service

Yongjian Wang BUAA Bejiing, June 2006 Router Service

Yongjian Wang BUAA Bejiing, June 2006 GOSv2 Architecture

Yongjian Wang BUAA Bejiing, June 2006 Router Service  Router Service is used to convert virtual address to physical address. Maintain local virtual resource to physical resource mapping relationships Communicate with neighbor router to form global view of all the deployed router services and service locating can achieved in this way.

Yongjian Wang BUAA Bejiing, June 2006 Router Service  Different routers form an application-level virtual network to exchange V-P mapping information

Yongjian Wang BUAA Bejiing, June 2006 Router Scenario- Link

Yongjian Wang BUAA Bejiing, June 2006 Router Scenario- Neighbor Update

Yongjian Wang BUAA Bejiing, June 2006 Router Scenario- search

Yongjian Wang BUAA Bejiing, June 2006 How to discovery resource in GOSv2  Resource discovery in GOSv2 consist of the following steps: Find effective address of resource Convert effective address into virtual address Convert virtual address into physical address

Yongjian Wang BUAA Bejiing, June 2006 System/Application Level Services

Yongjian Wang BUAA Bejiing, June 2006 Outline  GFI (Grid File Infrastructure) Meta service Provide logically global user file space Data Service Distributed file storage File transferred using soap message  Grid Batch System Using Grip and GFI to support global file stagein/out Using simple batch driver to connect to local batch systems, such as OpenPBS, LSF etc.  Grid Batch Accounting System

Yongjian Wang BUAA Bejiing, June 2006 Meta Service

Yongjian Wang BUAA Bejiing, June 2006 GOSv2 Architecture

Yongjian Wang BUAA Bejiing, June 2006 Functions of meta service  Name mapping on grid file effective name  virtual name  physical name

Yongjian Wang BUAA Bejiing, June 2006 Functions of Meta Service (cont.)  Maintain global file information  Maintain file access permissions information  Cooperate with Authorization Authority in agora service for file access authorization  User quota management

Yongjian Wang BUAA Bejiing, June 2006 Meta Service - Operations CategoryService Operations meta data query related isFile 、 isDir 、 exist 、 info 、 getVirtualName 、 List 、 Search file directory related createNewFile 、 delete 、 mkdir 、 rmdir 、 move 、 rename 、 upload file access permissions related getACLInfo 、 Auth 、 Revoke

Yongjian Wang BUAA Bejiing, June 2006 Data Service

Yongjian Wang BUAA Bejiing, June 2006 GOSv2 Architecture

Yongjian Wang BUAA Bejiing, June 2006 Functions of Data Service  Map user identification to local file directory Different user correspond to different local file directory  Store user file in local file system  Transfer file (download/upload) by servlet  Form distributed, uniformed user file storage space

Yongjian Wang BUAA Bejiing, June 2006 Data Service - Operations CategoryService Operations file or directory operation related mkdir 、 rmdir 、 creatNewFile 、 delete file transfer related setUploadFileName 、 setDownloadFileName

Yongjian Wang BUAA Bejiing, June 2006 GFI Client Side APIs CategoryClient Side APIs Meta operation related isFile 、 isDir 、 exist 、 info 、 getVirtualName 、 List 、 Search File/directory operation related createNewFile 、 delete 、 mkdir 、 rmdir 、 move 、 rename File transfer related Upload 、 DownLoad File/directory access permission related Auth 、 Revoke

Yongjian Wang BUAA Bejiing, June 2006 Upload File Scenario

Yongjian Wang BUAA Bejiing, June 2006 Grid Batch System

Yongjian Wang BUAA Bejiing, June 2006 GOSv2 Architecture

Yongjian Wang BUAA Bejiing, June 2006 Batch System in GOSv2  Local batch system driver Hiding different local batch systems such as OpenPBS 、 LSF and so on  Grid batch service Local batch system service wrapper  Grid batch system client side APIs Interact with batch service by grip Hiding details such as service invocation, file stagein / stageout

Yongjian Wang BUAA Bejiing, June 2006 Architecture of Batch Service

Yongjian Wang BUAA Bejiing, June 2006 Batch Job Descriptor

Yongjian Wang BUAA Bejiing, June 2006 Batch Service Scenario

Yongjian Wang BUAA Bejiing, June 2006 Batch service in the future  GridSAM will act as batch service for different grid node Support JSDL specification Support plain ftp and GridFTP based stagein/stageout Maintain job states Extend GridSAM to support OpenPBS and LSF batch system Replace GridSAM security mechanism with CNGrid security mechanism

Yongjian Wang BUAA Bejiing, June 2006 Grid Batch Accounting System

Yongjian Wang BUAA Bejiing, June 2006 GOSv2 Architecture

Yongjian Wang BUAA Bejiing, June 2006 Grid Batch Accounting System

Yongjian Wang BUAA Bejiing, June 2006 Q&A