The Grid Fabric layer provides the resources to
which shared access is mediated by Grid protocols.
A resource may be a logic entity, a storage resource,
a network resource or a computational resource. The
Fabric layer provides a resource-specific description
of capabilities such as: (a) mechanisms for starting,
monitoring and controlling of the resulting processes
and controlling the resources allocated to these
processes; (b) mechanisms for storing and retrieving
files and (c) management mechanisms that allow
control over resources allocated to processes and
data transfers.
The Communication layer defines the
communication and authentication protocols
required for Grid-specific transactions. While
communication protocols enable the exchange of
data between fabric layer resources, the
authentication protocols build on communication
services to provide security services, such as
authentication and integrity of users and resources
and tolerance to intrusions. The communication
layer should provide mechanisms for delegation,
integration of local security and trust management.
The Resource layer builds on top of the
connectivity layer for the secure negotiation,
initiation, monitoring, accounting and billing of
sharing operations on individual resources.
Therefore, resource layer protocols are concerned
entirely with individual resources and ignore issues
of global state and atomic actions. Examples of
resource layer protocols include information
protocols, which collect information about the
structure and state of a resource, and management
protocols, which are used to negotiate access to
shared resources while specifying resource
requirements and the operation to be performed.
The Collection layer contains protocols and
services that are able to capture interactions across
the collection of resources. Example of services
include (but are not restricted to): (a) the directory
services that allow Grid users to discover resources;
(b) the brokering services that allow users to request
the allocation of one or more resources and the
scheduling of tasks related to these resources; (c)
software discovery services that help discovering
and selecting execution platforms (or nodes) based
on user/application parameters and (d) collaboration
services that support accounting GRID services.
In Grid systems with distributed resources and
task ownership, it is important to consider quality of
service and security while discovering, allocating,
and using resources. The integration of QoS has
been examined with resource management systems
by different studies. However, little work has been
done for the integration of security considerations.
Most cases have assumed that security is
implemented as a separate subsystem from the Grid
and the resource management system.
In a previous work, (Abdelkader and Boudriga,
2005), we have developed a scheme to search and
use resources and access a GRID application. In
particular, we have demonstrated that after finding
the resource responding to the node requirements on
security and QoS, the requester delegates to this
resource the rights to use other resources that may be
needed during service provision. In this section, we
recall the major features of this scheme and extend it
to provide an adaptive behaviour that takes into
consideration the variability of network topology,
autonomy of nodes and security requirements.
Figure 2 depicts a Grid service setup. Three tasks
are basically involved in this process:
1. A node requesting a Grid service discovers the
ad-hoc nodes that are able to allocate tasks and
resources to establish the desired service.
2. Upon receiving the request, a node willing to be
involved in the Grid service answers the request
by sending a response specifying the accepted
tasks, the amount of resources it can allocate, the
security level of the process (engaged in that
node), the cost and whether the node will act as a
service provider or service operator.
3. On receiving the responses, the requestor selects
the set of nodes that will be engaged in the
provision of the grid service. A negotiation may
take place between the requestor and a
respondent before completing the service
established. The negotiation involves QoS
parameters, resources parameters and security
services.
Features of the aforementioned process include
the following three items:
• A service operator is a node that is in charge of
offering the service using its own resources and
the resources it can request on behalf of the
requester. Therefore, the original requester does
not need to know the identity of nodes involved
in that share. In this case, the service operator is
called delegated requestor.
• A service provider designates a node that acts as
a server. It allocates the resources needed to the
contracted tasks. It can leave the Grid on a
simple message informing the requestor of its
leave. It also can be dropped from the established
Grid for various reasons, including security
needs or renegotiation.
ICE-B 2006 - INTERNATIONAL CONFERENCE ON E-BUSINESS
24