Grid and Cloud Computing Important Questions Unit 5 Part A
The document discusses key concepts related to security in grid computing. It defines important terms like GSI functions, reputation-based trust model, direct reputation, authentication methods, authority types, grid security infrastructure, GSI protection mechanisms, GSI primary information, and data lineage. It also discusses identity and access management processes, challenges, and components of building a secure trust environment in grid computing.
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
47 views
Grid and Cloud Computing Important Questions Unit 5 Part A
The document discusses key concepts related to security in grid computing. It defines important terms like GSI functions, reputation-based trust model, direct reputation, authentication methods, authority types, grid security infrastructure, GSI protection mechanisms, GSI primary information, and data lineage. It also discusses identity and access management processes, challenges, and components of building a secure trust environment in grid computing.
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4
CS6703-GRID AND CLOUD COMPUTING
DEPARTMENT OF CSE/IT – ANNA UNIVERSITY
IMPORTANT QUESTIONS WITH ANSWERS - DEFINITIONS
UNIT -4 SECURITY
PART-A
1. What are the functions present in GSI
GSI may be thought of as being composed of four distinct functions: message protection, authentication Delegation authorization. 2. What are the challenges of grid sites? The first challenge is integration with existing systems and technologies. The second challenge is interoperability with different hosting environments. The third challenge is to construct trust relationships among interacting hosting environments. 3. Define Reputation-Based Trust Model In a reputation-based model, jobs are sent to a resource site only when the site is trustworthy to meet users’ demands. The site trustworthiness is usually calculated from the following information: the defense capability, direct reputation, and recommendation trust. 4. Define direct reputation Direct reputation is based on experiences of prior jobs previously submitted to the site. The reputation is measured by many factors such as prior job execution success rate, cumulative site utilization, job turnaround time, job slowdown ratio, and so on. A positive experience associated with a site will improve its reputation. On the contrary, a negative experience with a site will decrease its reputation. 5. What are the major authentication methods in the grid? The major authentication methods in the grid include passwords, PKI, and Kerberos. The password is the simplest method to identify users, but the most vulnerable one to use. The PKI is the most popular method supported by GSI. 6. List the types of authority in grid The authority can be classified into three categories: attribute authorities, policy authorities, and identity authorities. Attribute authorities issue attribute assertions; policy authorities issue authorization policies; identity authorities; issue certificates. The authorization server makes the final authorization decision. 7. Define grid security infrastructure The Grid Security Infrastructure (GSI), formerly called the Globus Security Infrastructure, is a specification for secret, tamper-proof, delegatable communication between software in a grid computing environment. Secure, authenticable communication is enabled using asymmetric encryption. 8. List the protection mechanisms in GSI GSI allows three additional protection mechanisms. The first is integrity protection, by which a receiver can verify that messages were not altered in transit from the sender. The second is encryption, by which messages can be protected to provide confidentiality. The third is replay prevention, by which a receiver can verify that it has not. 9. What is the primary information of GSI? GSI authentication, a certificate includes four primary pieces of information: a subject name, which identifies the person or object that the certificate represents; the public key belonging to the subject; the identity of a CA that has signed the certificate to certify that the public key and the identity both belong to the subject; the digital signature of the named CA. 10. Define blue pill The blue pill is malware that executes as a hypervisor to gain control of computer resources. The hypervisor installs without requiring a restart and the computer functions normally, without degradation of speed or services, which makes detection difficult. 11. What are the host security threats in public IaaS? (Dec 2017) Stealing keys used to access and manage hosts (e.g., SSH private keys) Attacking unpatched, vulnerable services listening on standard ports (e.g., FTP, SSH) Hijacking accounts that are not properly secured (i.e., no passwords for standard accounts) Attacking systems that are not properly secured by host firewalls Deploying Trojans embedded in the software component in the VM or within the VM image (the OS) itself 12. List the Public Cloud Security Limitations There are limitations to the public cloud when it comes to support for custom security features. Security requirements such as an application firewall, SSL accelerator, cryptography, or rights management using a device that supports PKCS 12 are not supported in a public SaaS, PaaS, or IaaS cloud. Any mitigation controls that require deployment of an appliance or locally attached peripheral devices in the public IaaS/PaaS cloud are not feasible. 13. Define Data lineage Data lineage is defined as a data life cycle that includes the data's origins and where it moves over time. It describes what happens to data as it goes through diverse processes. It helps provide visibility into the analytics pipeline and simplifies tracing errors back to their sources. 14. Discuss on the application and use of identity and access management. (Dec‟16) Identity and Access Management (IAM) is used to manage access to resources by assuring that the identity of an entity is verified, then granting the correct level of access based on the protected resources. 15. What are the IAM processes operational activities. Provisioning Credential and attribute management Entitlement management Compliance management Identity federation management 16. What are the functions of Cloud identity administrative? Cloud identity administrative functions should focus on life cycle management of user identities in the cloud—provisioning, deprovisioning, identity federation, SSO, password or credentials management, profile management, and administrative management. Organizations that are not capable of supporting federation should explore cloud-based identity management services. 17. Mention the importance of Transport Level Security (Dec‟16) Transport Level Security (TLS) entails SOAP messages conveyed over a network connection protected by TLS. TLS provides for both integrity protection and piracy. Transport Level Security is supported today as a higher performance alternative to the more standard driven, message level security. 18. What is meant by the terms data-in-transit It is the process of the transfer of the data between all of the versions of the original file, especially when data may be in transit on the Internet. It is data that is exiting the network via email, web, or other Internet protocols. 19. List the IAM process business category User management Authentication management Authorization management Access management Data management and provisioning Monitoring and auditing 20. What are the key components of IAM automation process? User Management, New Users User Management, User Modifications Authentication Management Authorization Management 21. What are the various Challenges in building the trust environment? (Apr/May 2017) Identification Privacy Personalization Integration Security Scalability 22. Identify the trust model based on site’s trust worthiness. (Dec 2017) A user job demands the resource site to provide security assurance by issuing a security demand (SD). On the other hand, the site needs to reveal its trustworthiness, called its trust index (TI). These two parameters must satisfy a security-assurance condition: TI ≥ SD during the job mapping process. When determining its security demand, users usually care about some typical attributes. 23. Write the brief note on the security requirements of grid? (Apr/May 2017) Authentication Authorization Assurance/accreditation Accounting Audit