Security challenges for the next generation of highly available systems

S. Naqvi, M. Riguidel
{"title":"Security challenges for the next generation of highly available systems","authors":"S. Naqvi, M. Riguidel","doi":"10.1109/CCST.2005.1594840","DOIUrl":null,"url":null,"abstract":"Nowadays, highly available (HA) systems are a must, for almost any business process. More recently, the need for HA systems have increased as electronic commerce and other internet-based applications have become widely used with the growing Web usage. Security is a major concern for these systems. Companies want to make sure that their security systems are working flawlessly and efficiently. Making sure that these systems are available to allow the right people access to the right areas of the company is imperative. Traditionally, HA systems consist of proprietary hardware and software components. However, the price/performance advantages of commercial-off-the-shelf (COTS) based clusters have had a compelling affect on HA vendors and their marketplace. The emergence of computational grids makes it feasible to develop cost-effective, large-scale geographically distributed HA systems. Making sure that critical applications on this new generation of HA systems are secured is a challenging proposition. In this article, we have identified a list of challenges for the next generation of grid-based HA systems. We have explored the visualization of security services with their pluggable implementation to address the security needs of these grid-based HA systems. The main advantages of this solution include independence with respect to the underlying security mechanisms; best trade-off between security guarantees and processing capabilities; configurability of security architecture; better portability across heterogeneous platforms; and a smaller application development cycle for the HA functionality in the system.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"100 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2005.1594840","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Nowadays, highly available (HA) systems are a must, for almost any business process. More recently, the need for HA systems have increased as electronic commerce and other internet-based applications have become widely used with the growing Web usage. Security is a major concern for these systems. Companies want to make sure that their security systems are working flawlessly and efficiently. Making sure that these systems are available to allow the right people access to the right areas of the company is imperative. Traditionally, HA systems consist of proprietary hardware and software components. However, the price/performance advantages of commercial-off-the-shelf (COTS) based clusters have had a compelling affect on HA vendors and their marketplace. The emergence of computational grids makes it feasible to develop cost-effective, large-scale geographically distributed HA systems. Making sure that critical applications on this new generation of HA systems are secured is a challenging proposition. In this article, we have identified a list of challenges for the next generation of grid-based HA systems. We have explored the visualization of security services with their pluggable implementation to address the security needs of these grid-based HA systems. The main advantages of this solution include independence with respect to the underlying security mechanisms; best trade-off between security guarantees and processing capabilities; configurability of security architecture; better portability across heterogeneous platforms; and a smaller application development cycle for the HA functionality in the system.
下一代高可用性系统的安全挑战
如今,对于几乎所有业务流程来说,高可用性(HA)系统都是必须的。最近,随着Web的使用日益增长,电子商务和其他基于internet的应用程序得到了广泛的应用,对高可用性系统的需求也随之增加。安全性是这些系统的主要关注点。公司希望确保他们的安全系统能够完美高效地工作。确保这些系统是可用的,以允许合适的人访问公司的合适区域是必要的。传统上,高可用性系统由专有的硬件和软件组件组成。然而,基于商用现货(COTS)的集群的价格/性能优势已经对HA供应商及其市场产生了引人注目的影响。计算网格的出现使得开发具有成本效益的大规模地理分布式高可用性系统成为可能。确保新一代高可用性系统上的关键应用程序的安全是一项具有挑战性的任务。在本文中,我们确定了下一代基于网格的高可用性系统面临的一系列挑战。我们探索了安全服务的可视化及其可插拔实现,以满足这些基于网格的高可用性系统的安全需求。该解决方案的主要优点包括相对于底层安全机制的独立性;安全保证和处理能力之间的最佳权衡;安全架构的可配置性;跨异构平台更好的可移植性;并且缩短了系统中HA功能的应用程序开发周期。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信