1 / 9

Applying the Earth System Grid Security in a Heterogenous Environment of Data Access Services

Applying the Earth System Grid Security in a Heterogenous Environment of Data Access Services. Philip Kershaw STFC Rutherford Appleton Laboratory. Coupled Model Intercomparison Project Phase 5. CMIP5 is a framework for co-ordinated climate change experiments

rodney
Download Presentation

Applying the Earth System Grid Security in a Heterogenous Environment of Data Access Services

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Applying the Earth System Grid Security in a Heterogenous Environment of Data Access Services Philip Kershaw STFC Rutherford Appleton Laboratory

  2. Coupled Model Intercomparison Project Phase 5 • CMIP5 is a framework for co-ordinated climate change experiments • International collaboration: • Will input into the IPCC 5thAssessment Report (AR5) scheduled for 2013

  3. Access Control Requirements • Organisations responsible for model data need the ability to • register users and audit access, • keep the user community up to date with changes to data and services • protect finite computing resources, and to. • But, the technical and administrative barriers to participation need to be kept to a minimum: • organisations need to be able to join a federation easily. • Layer access control: • Over heterogeneous mix of individual organizations’ existing tools and services • whilst at the same time maintaining usability and ease of access. • 2. and 3. are points of failure for grids / federated systems

  4. Stating the Problem • The problem • Different services • Technology stacks • Organisational structures • Limitations on resources, bandwidth, storage processing power • Degree of separation of concerns proportional to potential interoperability and reusability • Slice and dice functionality • Web services – SoA • but also application middleware • Common libraries or common specs ... or both!

  5. ESG Security Architecture

  6. Functionality Slicing with WSGI • SoA – capability to slice up across web service interfaces • What about the applications themselves? • The Python Web Server Gateway Interface • Akin to Java servlets • A web application can be separated into a chain of middleware components each taking a pass over the input request and then passing it on to the next middleware short circuiting the chain to return a response • Slicing based on the functionality being provided

  7. REST and Access Control Policy • “With URI-based (REST) web services, administrators can apply ACLs to the service itself and to every document that passes through the service, because each of them would have a URI.” • “It is much harder to secure an RPC-based system where the addressing model is proprietary and expressed in arbitrary parameters, rather than being group together in a single URI.” • http://www.xml.com/lpt/a/923 REST and the Real World, Paul Prescod, 20 Feb ’02 • Different applications and toolkits each with their own security API • For HTTP, access control policy is determined by the characteristics of a request: the URI, the method GET, PUT etc. • Attributes which are independent of the specific of any given API toolkit. • This makes it independent of the application inner workings => separation from the application

  8. Preserving Modularity • Challenges to: • Requirements solidify, implementation beds down and can become brittle – lavaflow • Developers can prefer application specific security APIs • Preserve with: • Vigorous unit testing • Perhaps more importantly integration testing • Do the components still fit together OK?! • Is it worth preserving?

  9. Bringing it Together

More Related