Types of grid users and very basic example scenarios

We propose the following types of grid users and give some example use scenarios. Terms in italics are defined in the previous section.

Service end-user: data (SEUD)

Typical characteristic: No computing expertise

Example use-case / scenarios:

AM/security characteristic: SEUD does not need to be 'known' by the grid AM service (as the grid trusts and accounts the SP not the user). SP may need to authN/authZ and account for the user.

Service end-user: executables (SEUX)

Typical characteristic: Little computing expertise but may use a tool to generate executable code or scripts

Example use-case / scenarios:

Similar AM/security characteristic to SEUD. However, greater risks for the SP and the grid nodes will exist from supporting these types of users due to the nature of their input/output. Further defenses will be needed to support these users, who may eventually show a risk profile similar to the PUAs (see below).

Power user agnostic of grid resource node (PUA)

Typical characteristic: Develops programs and data but does not care where processing takes place

Example use-case / scenarios:

AM/security characteristic: PUA need not be 'known' by the grid AM service (but some sort of mapping to a billing account may be necessary). It is possible that the grid AM service may need status information from an identity provider (for authZ purposes).

Power user requiring specific grid resource nodes (PUS)

Typical characteristic: As PUA but may (or may not) have more platform etc. dependent expertise and some sysadmin expertise. (High degree of computing expertise).

Example use-case / scenarios:

AM/security characteristic: PUS may or may not need to be 'known' by the grid AM service (but some sort of mapping to a billing account may be necessary). All of the text regarding AM/security for PUA is equally valid here. However, in addition (or instead), grid node owners may wish to have a direct authN/authZ (and accounting) relationship with the PUS.

Power user developing a service (PUDS)

Typical characteristic: As PUA/PUS but developing expertise like SP

Example use-case / scenarios:

AM/security characteristic: As for PUS or PUA, but moving into arrangements like SP (see below). May need to begin interacting with and accounting for SEUs in an experimental manner.

Service Provider (SP)

Typical characteristic: As PUA/PUS but has expertise in authZ and possibly identity management

Example use-case / scenarios:

Many of the developers, administrators and owners of projects already mentioned will play the role of SP when the applications mature. A popular method of providing this service is to build a portal, possibly using web services to give an easy interface to the SEU.

SP provides a user interface (possibly via web, not necessarily via grid middleware) for SEUs. The SP interfaces directly with SEUs and then adopts a role as PUA or PUS in order to execute the processing job.

The SP may need to identify or authZ the SEU for access or accounting purposes. The SP then submits the 'job' to the grid, possibly via a resource broker or possibly directly to particular grid nodes. The SP collates the returning output and sends or presents it to the user.

AM/security characteristic: SP may be trusted to provide services only to those supposedly authorised to use the grid. SP may need to identify (authN) SEUs but will probably need to recognise status (authZ). SP will need strong authN between it and the primary grid service or grid resource nodes. Accounting may be required between the grid resource nodes (or primary grid service) and the SP and between the SP and the SEU (although this latter requirement may not need to be met using grid middleware).

As an individual, the SP could use any method (including that of devolved authentication) of access management to his/her machines (to which the SEUs connect or utilise in some way). Moreover, those machines may or may not be considered to be part of the grid.

Infrastructure sysadmin (Grid-Sys)

Typical characteristic: System administration of grid nodes with possibly infrastructure delivery and security expertise

Example use-case / scenarios:

AM/security characteristic: A Grid-Sys may need to authenticate directly to particular grid resource nodes. However, in theory, it is possible that s/he may authenticate elsewhere and the node computer may trust that external authentication point (or identity provider).

Third party beneficiary TPB (non-user)

Typical characteristic: Person or organisation who does not interact directly with the grid but where his/her/its personal data are being handled on the grid

Example use-case / scenarios:

Data belonging to or pertaining to a TPB may be handled by one or many grid nodes. These data may be required to be guaranteed to be confidential and the TPB may require anonymity.

AM/security characteristic: The TPB typically does not interact with the grid (whereby s/he would become a SEU) and therefore no direct AM may be required, except for interaction with the database that holds the confidential data (and this may not be considered a grid interaction – merely database authN/authZ). However, there is a possible security characteristic in that the TBP’s data and identity may have to be kept secret from other grid users.

ESPGRIDwiki: UserCategoryExampleActivities (last edited 2013-05-17 16:26:47 by localhost)