335 research outputs found

    Tool support for security-oriented virtual research collaborations

    Get PDF
    Collaboration is at the heart of e-Science and e-Research more generally. Successful collaborations must address both the needs of the end user researchers and the providers that make resources available. Usability and security are two fundamental requirements that are demanded by many collaborations and both concerns must be considered from both the researcher and resource provider perspective. In this paper we outline tools and methods developed at the National e-Science Centre (NeSC) that provide users with seamless, secure access to distributed resources through security-oriented research environments, whilst also allowing resource providers to define and enforce their own local access and usage policies through intuitive user interfaces. We describe these tools and illustrate their application in the ESRC-funded Data Management through e-Social Science (DAMES) and the JISC-funded SeeGEO projects

    A solution for secure use of Kibana and Elasticsearch in multi-user environment

    Full text link
    Monitoring is indispensable to check status, activities, or resource usage of IT services. A combination of Kibana and Elasticsearch is used for monitoring in many places such as KEK, CC-IN2P3, CERN, and also non-HEP communities. Kibana provides a web interface for rich visualization, and Elasticsearch is a scalable distributed search engine. However, these tools do not support authentication and authorization features by default. In the case of single Kibana and Elasticsearch services shared among many users, any user who can access Kibana can retrieve other's information from Elasticsearch. In multi-user environment, in order to protect own data from others or share part of data among a group, fine-grained access control is necessary. The CERN cloud service group had provided cloud utilization dashboard to each user by Elasticsearch and Kibana. They had deployed a homemade Elasticsearch plugin to restrict data access based on a user authenticated by the CERN Single Sign On system. It enabled each user to have a separated Kibana dashboard for cloud usage, and the user could not access to other's one. Based on the solution, we propose an alternative one which enables user/group based Elasticsearch access control and Kibana objects separation. It is more flexible and can be applied to not only the cloud service but also the other various situations. We confirmed our solution works fine in CC-IN2P3. Moreover, a pre-production platform for CC-IN2P3 has been under construction. We will describe our solution for the secure use of Kibana and Elasticsearch including integration of Kerberos authentication, development of a Kibana plugin which allows Kibana objects to be separated based on user/group, and contribution to Search Guard which is an Elasticsearch plugin enabling user/group based access control. We will also describe the effect on performance from using Search Guard.Comment: International Symposium on Grids and Clouds 2017 (ISGC 2017

    Flexible And Secure Access To Computing Clusters

    Get PDF
    The investigation presented in this paper was prompted by the need to provide a manageablesolution for secure access to computing clusters with a federated authentication framework.This requirement is especially important for scientists who need direct access to computingnodes in order to run their applications (e.g. chemical or medical simulations) with proprietary,open-source or custom-developed software packages. Our existing software, whichenables non-Web clients to use Shibboleth-secured services, has been extended to providedirect SSH access to cluster nodes using the Linux Pluggable Authentication Modules mechanism.This allows Shibboleth users to run the required software on clusters. Validationand performance comparison with existing SSH authentication mechanisms confirm that thepresented tools satisfy the stated requirements

    Federated identity architecture of the european eID system

    Get PDF
    Federated identity management is a method that facilitates management of identity processes and policies among the collaborating entities without a centralized control. Nowadays, there are many federated identity solutions, however, most of them covers different aspects of the identification problem, solving in some cases specific problems. Thus, none of these initiatives has consolidated as a unique solution and surely it will remain like that in a near future. To assist users choosing a possible solution, we analyze different federated identify approaches, showing main features, and making a comparative study among them. The former problem is even worst when multiple organizations or countries already have legacy eID systems, as it is the case of Europe. In this paper, we also present the European eID solution, a purely federated identity system that aims to serve almost 500 million people and that could be extended in midterm also to eID companies. The system is now being deployed at the EU level and we present the basic architecture and evaluate its performance and scalability, showing that the solution is feasible from the point of view of performance while keeping security constrains in mind. The results show a good performance of the solution in local, organizational, and remote environments

    Interoperable e-Infrastructure Services in Arabia

    Get PDF
    e-Infrastructures became critical platforms that integrate computational resources, facilities and repositories globally. The coordination and harmonization of advanced e-Infrastructure project developed with partners from Europe, Latin America, Arabia, Africa, China, and India contributed to developing interoperable platforms based on identity federation and science gateway technologies. This paper presents these technologies to support key services in the development of Arabia networking and services platform for research and education. The platform provides scientists, teachers, and students with seamless access to a variety of advanced resources, services, and applications available at regional e-Infrastructures in Europe and elsewhere. Users simply enter the credentials provided by their home institutions to get authenticated and do not need digital certificate-based mechanisms. Twenty applications from five scientific domains were deployed and integrated. Results showed that on average about 35,000 monthly jobs are running for a total of about 17,500 CPU wall-clock hours. Therefore, seamlessly integrated e-Infrastructures for regional e-Science activities are important resources that support scientists, students, and faculty with computational services and linkage to global research communities

    Concept, design and initial implementation of the de.NBI Cloud Portal

    Get PDF
    Wiens M. Concept, design and initial implementation of the de.NBI Cloud Portal. Bielefeld: Universität Bielefeld; 2018.The amount of data produced in life sciences is continuously rising and is impossible to analyze on local computers. For that reason the German network for bioinformatics de.NBI is establishing a cloud computing environment called de.NBI Cloud with the prospect to be integrated into the European life sciences network Elixir. For that process and for the interconnection of compute centers a novel cloud platform “de.NBI Cloud Portal” was developed. It utilizes Elixir’s authentication and authorization infrastructure and connects five OpenStack-driven compute centers together in an abstract manner. This thesis deals with requirements, design and initial implementation of the de.NBI Cloud Portal

    How far does it go? Understanding Efficacy of Off-Campus Remote Access Services: Use Case of Knimbus and MyLOFT

    Get PDF
    E-resources are the backbone of the learner community in this information superfluous era. Digital technology has made remote access to the E-resources more easy, speedy, and comfortable. The advent of technology has made the libraries add new resources to their existing collection. For the academic community, remote access to the e-resources has become a very important part of their education and research, especially in this pandemic period. Library users are keen on searching and retrieving information stored/viewed from a distance or stored in remote locations. Remote login access to online library e-resources is the best practice that helps the users to access their desired information wherever they stay without wasting time which fills the gap between a library and its users being always remained connected. It allows the best easy access to the use of the e-resources of the library through its interface from anywhere. In this study, an attempt has been made to understand the perception of users based on their reviews of the remote access platforms mobile apps, Knimbus and MyLOFT. Sentiment analysis is conducted using Appbot software to derive insights from 73 user reviews of the Knimbus app and 253 reviews of the MyLOFT app from 10th July 2008 to 11th December 2021. The study has identified that the overall sentiment score of Knimbus and MyLOFT is 64% and 62% respectively. The data analytics shows that Knimbus is having a better satisfaction ratio than the MyLOFT and it is better serving the purpose of providing the e-resources and contributing to the teaching and learning process
    • …
    corecore