- Open Access
Heterogeneous resource federation with a centralized security model for information extraction
Journal of Internet Services and Applications volume 4, Article number: 10 (2013)
With the continuous growth of data generated in various scientific and commercial endeavors and the rising need for interdisciplinary studies and applications in e-Science easy exchange of information and computation resources capable of processing large amounts of data to allow ad-hoc co-operation becomes ever more important. Unfortunately different communities often use incompatible resource management systems. In this work we try to alleviate the difficulties occurring on bridging the gap between different research eco-systems by federating resources and thus unifying resource access.
To this end, our solution presented in this paper outlines a secure, simple, yet highly interoperable and flexible architecture using RESTful Web services and WebDAV. While, first and foremost in the Grid computing domain, there are already standards and solutions in place addressing related problems, our solution differs from those approaches by allowing to federate data storage systems that are not aware of being federated. Access to these is enabled by our federation layer using storage system specific connectors. Hence, our federation approach is intended as an abstraction layer on top of existing storage or middleware solutions, allowing for a more uniform access mechanism.
Additionally, our solution also allows for submission and management of computational jobs on said data, thereby federating not only data but also computational resources. Once resource access is unified, information from different data formats can be semantically unified by information extraction methods. It is our belief that the work in this paper can complement existing Grid computing efforts by facilitating access to data storage system not inherently available via commonly used Grid computing standards.
In recent years the transparent and secure handling of large data sets has become increasingly important for a broad range of different scientific and commercial applications [1, 2], in particular to handle huge amounts of scientific data for simulation or analysis in various research fields . In the past years, Grid computing  has evolved for many different disciplines, ranging from solving computationally intensive tasks to the provision of services for application steering, user management and the creation of complex workflows, but also of resources for data management . A strong advantage of Grid computing is the ability to maintain distributed and heterogeneous resources using a middleware layer to distribute computational jobs or delegate user access to data storage space. The use of distributed computing resources becomes more and more important in many research fields using state-of-the-art information systems to even enable collaborative work over institutional boundaries. To some extent, Grid and, more recently, Cloud resources can be used for distributing computing tasks or providing access to distributed data resources. Since, generally speaking, the resource demand in scientific computing is continuously on the rise and the potential of interdisciplinary work is large, an easy and secure access to computing resources becomes even more important.
For large-scale projects usually including lots of partners from different organisations, the provision of relevant data can not be assured by a single organisation alone, but has to be organized among the partners across organisational boundaries. In the past, these efforts were often realized by nation-wide or even international cross-linking of computing centers providing a Grid of computing resources . This has lead to rather large offers for the scientific community to access High Performance Computing (HPC) and High Throughput Computing (HTC) resources provided by large data centers, e.g. via XSede  in the U.S. or the EGI federation  supported by the EU. Other approaches such as the national German Grid Initiative D-Grid  emphasised and spread the idea of using Grid resources and methods of distributed computing in general in the their local scientific communities. In this context, we have examined capabilities for further decreasing hurdles typically faced by user-groups intending to adopt Grid computing to their daily work. The WisNetGrid  project of the aforementioned D-Grid initiative has investigated a more general approach for facilitating access to distributed storage solutions in general, ranging from traditional Grid middlewares over databases to Web-based resources.
By extending the range to additional data and information resources in general, the WisNetGrid project aims at furthering the potential for using data across different scientific disciplines and related fields, such as physics, biology, medicine, geographic information and humanities. Some of the aforementioned knowledge resources are publicly available via the Internet, others require authentication due to project-specific or commercial reasons. The common theme is that these resources, sometimes provided by governmental authorities [10, 11], are often offered as databases or ontologies and thus might be of interest to interdisciplinary studies. However, these data are usually not accessible to Grid computing in a traditional and standardized manner. By having our access layer support a broader range of resource types and different underlying access control mechanisms, our solution is capable of providing uniform access to most distributed storage systems, both traditional Grid and Non-Grid.
In this paper, we introduce a system for federating multi-organizational and heterogeneous computer resources into a uniform namespace and making them accessible by way of a uniform interface using the widely supported WebDAV standard. We understand resource federation as logically joining resources, primarily data resources, from different distributed heterogeneous resources without moving or copying data from these resources to the resource access and federation system. Our resource access and federation system contrasts from related work in so far as the resources to be federated are not aware of being used in a federation context. This means, that a particular storage system is still being operated by the individual institutions or operators and that access modalities already in place are not modified. Our solution federates storage systems by way of storage system specific connectors (e.g. a MySQL connector for federating a MySQL database) running in the federation system backend and making use of our security model based on delegated authentication by way of supplied user credentials. Hence, it is safe to classify our approach as user-centric. See section 3 for more details regarding both the architecture and the realization of this federation mechanism.
Operators of our resource access and federation system do not necessarily have to own the distributed resources to be federated, but have to take care of two matters. First, they need negotiate and manage collaborative agreements for partners who wish to participate in the federation system. Second, they need to provide a connector element for each storage system to be federated. Although the main focus lies on the federation of data resources our system also supports submission and management of jobs operating on these data resources. Also, this work outlines how essential information contained in federated data can be further unified and leveraged by applying information extraction methods. While information extraction is computationally intensive, our architecture allows for parallelisable computational resources to be used.
To illustrate how higher-level applications can easily make use of uniform data access and to provide an example of data federation and information unification we discuss a use-case from the humanities. In this use-case the information extraction module is a higher-level application that benefits from uniform access to data resources provided by the system described in detail in section 3. This enables the extraction module to provide the user with a uniform representation of information found in source files of multiple origins without having to deal with the particular storage systems involved himself.
In particular, assume a humanities-oriented application scenario, where the research community is trying to link works of and about particular authors. Such works migh be available in digital form, but held by different legal entities. In adopting our solution, each group agreeing to share information only needs to integrate their data into the federation system, and all community members, who are granted the corresponding permissions, can access sources from all participating data providers via a uniform interface.
Additionally, the extraction system, acting on behalf of a particular user, can access all files the user holds access rights for. Thus, it can, for instance, lift entity mentions, i.e. mentions of persons, places etc. onto a semantically unambiguous level, linking e.g. different writings of a name or even different names for the same thing or person. This allows, for instance, to trace a particular semantic entity in different contexts without the need for expert users who know all possible ways the semantic entity could be addressed in these contexts. This also allows for interdisciplinary work, linking sources of different research communities. For instance, places or persons occurring in literary texts could be linked with information retrieved from historical or geological information sources. This use-case and the interaction between the high-level extraction services with the resource federation component is described in section 5.
In the following section 2 we discuss our approach regarding an infrastructural centric view of larger consortia and focusing on technical aspects of related solutions with similar approaches to realizing federated access to distributed storage systems. We intend for our data access system to strongly support the user with accessing the resources required for his use-case. To fulfill the aforementioned goals, developing a flexible and highly interoperable security solution was essential. Section 4 discusses how our solution is able to federate different distributed resources by accessing data from different resources while conforming to the different resource-specific authentication and authorization mechanisms.
2 Related work
In the Grid and, nowadays, the Cloud computing domains, middleware solutions are used as abstraction layers to facilitate access to and enable interoperability between (geographically) distributed computing infrastructures such as super computers, high-performance clusters and larger computing centers . For accessing those computing resources, every middleware offers different services for job submission and management, data management on the application level, or user administration for Grid access and support.
Today, larger consortia have been established in order to focus efforts from individual data centers towards a more service-oriented approach for scientific communities to use larger computing resources, such as XSede  in the U.S. or data centers unified under the European Grid Infrastructure (EGI) . Such a range of services is provided by a management layer to local data centers (service providers) running individual HPC or Grid resources. This typically does not mean that every provider offers the same services, either for accessing data storage space or for computing resources. Furthermore, services of different middleware solutions might not be compatible with each other.
The choice of selected middleware solutions at particular data centers might also represent a technical hurdle to be taken by new user groups, or by trying to combine existing technical solutions from different user groups to enable collaborative work between these groups. Typical hurdles are different security infrastructures (e.g. authentication via username/password or X.509 certificates ) or differing data representations (e.g. database or file systems), which are handled differently by various middlewares.
Within the context of our project, we have investigated a more generalized approach in order to be able to address a broad range of resources, not only Grid middlewares. Therefore, we do not compete with well-established Grid computing middlewares. Instead, we offer an additional way for accessing distributed resources by providing an additional access mechanism and do not intend to replace existing solutions.
A different, but interesting approach to distributed Grid resources is the access mechanism via science gateways, which also hides the technical details of the specific data access mechanism or its clients from user and provides a transparent interface. Several approaches are available to address Grid resources [14, 15], but often with a strong focus on community-only requirements and services. Sharing data or services among different groups is still not the main focus of these developments.
Addressing the latter point, the data integration layer of three Grid projects from the German Grid initiative has been analyzed in terms of standardization  on the architectural level, but to our knowledge this work remains on the conceptual level. To tackle these interoperability concerns, the EMI project  aims at standardizing services of four different middleware solutions on a technical level. However, for the goals stated in this work, the scope of the EMI project shares related goals, albeit with a focus on Grid, since there are no non-Grid based data sources considered.
Using Grid computing, either for data or computing relevant concerns, also necessitates user authentication and authorization  mechanisms. To facilitate access and to increase usability of project-specific Grids, development of Web browser - based services, called Grid portals, was observed . This combination of Web browser access and Grid computing requires passing user credentials throughout the federation system to transport user requests from the HTTP layer to the middleware execution layer. This concept of Single-Sign On was first adopted to the Grid computing domain by using proxy certificates [20, 21]. In general, this concept is also integrated in science gateways as mentioned before, and realized in various community based projects, e.g. as described for PolarGrid  or other community based projects, such as MosGrid [23, 24] (also a D-Grid project). Besides the authentication federation by OpenID , PolarGrid supports a more general non-OpenID based mechanism to also support further authentication services, albeit these are still in development . Nonetheless, this marks an interesting approach to extend access and visibility of Grid computing systems to other access mechanisms like Social Networks.
A further solution to pass user credentials via Web Single Sign-On across organizational boundaries is Shibboleth . It is based on SOAP Web services  and uses SAML 2.0  to interact with arbitrary identity providers. Apart from authentication, SAML 2.0 also provides means for authorization and for user attributes (key-value pairs of arbitrary data). In use cases where components are not based on platforms SOAP Web services are easily available for or applicable to, the SOAP Web service dependency of SAML 2.0 can be a drawback, especially regarding our intention to provide a highly interoperable system. The GridShib [29, 30] project combined Shibboleth and the Globus Toolkit to map SAML assertions to X.509 certificates . However, the drawback is the restriction to the Globus Toolkit.
Concerning Web Single Sign-On in general,  outlines weaknesses of security protocols based on insecure properties of Public Key Infrastructure and the Domain Name System. Furthermore, a more secure cookie type is introduced and used as part of a proposal for a more secure Single Sign-On protocol. In contrast to usual cookies, it also contains a list of public keys denoting eligible target servers. During the SSL handshake between a Web browser with such a cookie and the target server, the target server needs to match one of the aforementioned public keys. A subsequent proof-of-concept with security evaluation regarding multiple attack types is given and shows that this concept secures against a malicious website impersonating a valid target server.
3 Resource federation
Accessing and manipulating data stored in different data storage systems such as databases, Grid data management or file systems within the context of a single use case can be difficult and time-consuming. First, there are many possible data representations (e.g. entries in a database or files), access and security protocols. Second, a use case requiring collecting and analyzing data from different data storage systems must know how to communicate with all of them and how to interpret the received data. Adding support for a new type of data storage system necessitates some sort of connector extension with regard to the required communication and security protocols, but also requires support for new data formats. This becomes increasingly inconvenient as more resources of different resource types need to be integrated.
In Grid environments, heterogeneous resources are mostly hidden from the user by a middleware layer which provides a uniform view on the resources. The middleware communicates with the underlying resources and is responsible for transforming client requests into formats consumable by the actual requested resources and vice versa. In our case, the aforementioned resources might be different data storage systems, as described in the beginning of this section.
3.1 Uniform access
The resource federation system described in this paper realizes such a middleware layer. It provides uniform access by using the WebDAV protocol,a which is an extension of the HTTP/1.1-protocol . Although the HTTP/1.1 protocol already supports methods for reading (GET), writing (POST/PUT) and deleting (DELETE) resources, our resource federation system requires additional methods.
WebDAV provides further operations such as locking (LOCK/UNLOCK), copying (COPY) and moving (MOVE) resources on the respective data storage systems. Furthermore, methods for reading (PROPFIND) and updating (PROPPATCH) metadata of resources are supported which allows to represent resources and corresponding arbitrary metadata with one URIb even when they are stored at different locations. The increasing amount of data necessitates the use of data management systems with metadata management support. In the context of our work, we identified WebDAV as a suitable building block for our resource access and federation system, both regarding data and metadata management.
To provide the aforementioned uniform access our architecture consists of the following four components: SSO Database Stores user information, authentication data and credentials SSO Server Central access point of the security infrastructure Credential Manager Graphical user interface for management of external credentials Resource Federator Interface between the user and resources
Figure 1 shows how the four components interact with each other.
The SSO Database stores user information (e.g. name or e-mail address), the authentication data for accessing the SSO Server (username and password) and external credentials used by the Resource Federator for delegated user authentication on connected (i.e. federated) resources. The credential type depends on the underlying security model of the resource in question (e.g. a password for a MySQL database or a X.509 certificate for a Grid resource). Credentials are stored plain or encrypted with the public key provided by the server running the Resource Federator. The encryption allows the resource providers to hide security relevant data from third party system.
The SSO Server is the only component, which is directly accessing the SSO Database and is the starting point for other components requiring security mechanisms. The SSO Server provides both a graphical user interface and a Web service interface. See subsection 4.2 for more details.
The federation of resources in our namespace is done by the Resource Federators instances. Each of those is able to integrate and process CRUD operations on resources (represented via URIs) depending on the user privileges and supported functions of the used Connectors (see section 3 for further details). The privileges required to use an integrated resource are composed of the authentication data (verified by the SSO Server) and the credentials (verified by the service provider of the resource).
The Credential Manager provides a graphical user interface to the external credential management part of the SSO Server Web service interface. Therefore, the Credential Manager is populated with URIs to all Resource Federator instances in the federation used to build an internal collection of all federated resources with corresponding types (e.g. MySQL, IRODS, UNICORE, local file system etc.). This information is used to generate corresponding input masks for external credential management. A MySQL input mask provides fields for username and password specification, whereas a UNICORE input mask provides a Java Applet (which, by default, runs locally on the user’s computer) to issue a signed SAML 2.0 trust delegation token using the user’s private key. Optionally, the user can encrypt his external credential with the public key of the corresponding Resource Federator instance. Subsection 4.1 sheds more light on this security model.
3.2 Resource federation
The aforementioned resource federation system is composed of three components:
and is illustrated in Figure 2.
The Web Server interacts with the client according to the HTTP 1.1 protocol. Requests are forwarded to the Routing Engine and the system’s response is sent back to the client. The Routing Engine allows to define routes and to process routed message using a set of intermediaries. The resource access and federation system defines a route by two endpoints (start and end points) and a certain number of intermediaries (elements for manipulating messages, from here on individually referred to as Process). The start point creates an exchange object (Message), stores the client request and an empty response in it and sends it to the endpoint. Before the message reaches the endpoint it is processed by the following Processes: Preparation Sets the name of the requested source and the relative path of the data Location Loads information about the respective data storage system Credential Connects to the Single Sign-On server to retrieve a user’s external credentials (see section 4.1) for the data storage system hosting the requested resource Connector Provides the interface between the WebDAV server and the specified data storage system Exception Aborts the route and provides detailed error handling for the responses
Preparation scans the requested URI, takes the data storage system name and the relative path of the requested resource and stores both in Message. Using the data storage system name, Location loads information (defined in a configuration file) about this data storage system and adds this information to the Message. Then, the required external credential to access the requested resource on behalf of the user is retrieved from the Single Sign-On server and stored in Message. Connector loads the connector for the requested data storage system with the collected credential and location information and hands it over to Message. The connector provides methods to process data/metadata: it is specialized for a certain type of resource and acts as an interface between the resource and WebDAV Server. The endpoint of the route creates the WebDAV Server environment with the collected data in Message and starts it. WebDAV Server processes the request with the help of the connector and generates a response, which is sent to the Java Servlet in Web Server.
The generic resource federation supports the introduction of new connector types and Process implementations (e.g. a billing Process). Therefore, extensibility does not necessitate source code changes. Instead the Camel route, defined in the configuration file, must be changed. It is also possible to use other WebDAV server implementations or even a completely different protocol as endpoint. It is up to the specific user group which process has to be provided.
3.3 Submission and management of computational jobs
The architecture just described is not restricted to data access and manipulation. Other types of resources can be integrated as well. As a particularly important case, we have integrated data processing capabilities into our system. We chose to do this by implementing an connector which can submit jobs to the UNICORE Grid middleware. The user interacts with this job connector via a WebDAV directory. Job description documents can be uploaded (via HTTP POST) into this directory, while each submitted job corresponds to a file in the directory. Viewing these job files in a browser or downloading them allows to check job status.
The security system described in section 4 is perfectly suited to integrate UNICORE resources, since UNICORE uses a trust delegation system based on signed SAML 2.0 assertions . UNICORE jobs can participate in an active security session, and manipulate data through the WebDAV interface.
4 Security federation
As a multi-user distributed system comprised of multiple applications and potentially spanning multiple organizational boundaries, authentication (identity verification) and authorization (access control after successful authentication) are core requirements of the security infrastructure to apply.
Both for usability and administration considerations, a centralized Single Sign-On authentication approach is suitable for our resource federation system (see section 3). In this context, Single Sign-On is briefly described as follows: on accessing any given application within the resource federation system, a yet unauthenticated user is prompted to supply only one and the same valid security credential (a username and password combination) whereupon he is authenticated to the whole system. All applications thus protected form a shared Single Sign-On domain. Single Sign-Off specifies the reverse property where a user signing off at any given application within a Single Sign-On domain automatically terminates his access to all other applications within the same Single Sign-On domain.
Authorization comes into play after successful authentication: each subject has a set of roles that are used for access control.
In addition to this traditional sequence of authentication and authorization, we needed a trust delegation mechanism allowing our resource federation system to act on behalf of users to access federated external resources (see section 3 and Figure 3). To this end, our security model is required to allow a user to manage his respective resource credentials, giving him the means necessary to add, edit, configure and remove them. Also, our security model had to support users interacting with the system using both Web browsers and WebDAV clients, thereby necessitating two different security interfaces.
In addition to the aforementioned requirements, our security model had to accommodate the heterogeneous and distributed characteristics of the system described in chapter 3 and thus be interoperable. Finally, we intended our security solution to also be applicable to similar use cases aiming at heterogeneous resource federation, albeit without necessitating a complex security stack imposing too much of an interoperability overhead (e.g. SOAP-based, which is merited in SAML-based trust delegation scenarios, but not necessary for this scenario).
4.1 Security model
Our security model consists of four actors: the security provider, subject, service provider, and external system. Obviously, the security provider is the server-side part of our central security system we labeled ‘Single Sign-On server’. Both terms are used interchangeably.
To define what a subject exactly encompasses, a definition is in order: in the course of this work, we regard any entity that can make requests to resources secured by the security provider as a subject. According to this, a subject can be a human, i.e. a user, or a non-human entity like a service, an application or, more generally, a computer system. A principal is an identifying attribute (or a set thereof) of an authenticated subject, such as a unique key or a user account. In our security model, it consists of a unique id, a password, roles, external credentials and further optional attributes, such as user details should the subject be a user.
A service provider is an application that delegates security to a Single Sign-On domain. Situated outside of a Single Sign-On domain are external systems containing resources a subject has access tokens to. This signifies use cases where a service provider acts as an intermediary between a subject and an external system containing resources requested by the subject. To fulfill this function, an intermediary service provider uses the corresponding external credential of the subject, thereby making it a necessity for the subject to trust the service provider with its extended credentials.
An external credential consists of a resource name denoting the external resource (e.g. a database), the subjects’s id on that external system (if applicable) and the actual credential (e.g. a password). Since the latter is persisted in serialized form, its format can be arbitrary. It can be a plain text password, a X.509 certificate  or even a SAML assertion .
In this security model, the combination of subject id and password is used for authentication to the Single Sign-On domain. After successful authentication, the security provider can map the subject to its corresponding principal and thus provide respective service providers with its roles for access control and external credentials for trust delegation. Once authenticated, a subject is also identified by a unique session, itself consisting of a unique id and the aforementioned principal. Said unique session id is returned to a subject after successful authentication to be used as an identification token for subsequent requests. Its validity can be terminated on the client and server sides (see Section 4.2 of this chapter).
For trust delegation to work, a subject must provide external credentials for the external resources he intends to access. This needs to be done beforehand and only once, unless the actual access token is changed on the external system side. Optionally, the subject can opt to encrypt each external credential with the public key of a service provider, thereby restricting access to that service provider alone that can decrypt this credential using its private key.
4.2 Components and interaction
The Single Sign-On server was implemented with the Java programming language as was the Single Sign-On client library used by service providers. Furthermore, principals and corresponding authenticated sessions are persisted using an extensible persistence layer allowing for both local and remote databases and thereby implicitly supporting data replication depending on the specific persistence backend.
The Single Sign-On server offers Web browser and Web service  interfaces, both relying on Transport Layer Security for channel security. The former uses Simple Transport Layer Security, the latter requires mutual authentication using the client-authenticated extensions.
The Web browser interface is required for initial account registration and for account self-management. It also serves as the single point of Single Sign-On and Single Sign-Off for Web browser users and provides administrative functions, such as listing, locking, deleting user accounts and assigning user roles. The aforementioned unique session id used as an identification token is stored as a Cookie in the user’s Web browser, thereby rendering that Cookie a client-side reference to the user’s actual session in the Single Sign-On server. The Cookie is secured by both the ‘Secure’ and ‘HttpOnly’ options, together limiting Cookie communication to encrypted HTTP connections. Cookie validity is terminated by the Single Sign-On server after a session’s idle time exceeds a customizable global session lifetime. Client-side Cookie termination is either directly performed by the user via the Web browser interface Single Sign-Off, thereby triggering the subsequent deletion of the corresponding session in the Single Sign-On server. This also leads to the Cookie being deleted in the user’s Web browser. Closing the Web browser without performing Single Sign-Off will also delete the Cookie, but with the session still existing in the Single Sign-On server until it expires. For Web browser Single Sign-On to work, a user’s Web browser needs to store one clone of the aforementioned Cookie for each service provider. Since Cookies are inherently bound to WWW domains, we implemented the cross-domain Cookie sharing algorithm outlined in .
For our Web service interface, we employed the Representational State Transfer (REST)  paradigm, since it uses HTTP methods, thereby only requiring a very basic and practically ubiquitous Internet protocol. This design choice was further influenced by the availability of open-source HTTP client libraries for a plethora of programming languages and systems, thereby strongly supporting our goal of providing a highly interoperable security solution for resource federation and similar use cases. One of those open-source HTTP client libraries  supports 42 programming and scripting languages.
Security delegation for service providers is facilitated by way of a high-level Java-based Single Sign-On client library abstracting from lower-level Web service data transformation and transmission mechanics. Thus, each service provider can use its Single Sign-On client to authenticate and authorize user requests without having to provide its own fully-fledged security system. Non-Java-based service providers need to provide Single Sign-On client implementations of their own, which in itself only constitutes a low barrier given the aforementioned highly interoperable nature of the Web service interface.
To reduce architectural complexity, we opted for delegating external credential management to a service provider of its own that makes use of the aforementioned Web service interface as opposed to integrate it within the Single Sign-On server. This service provider, labeled Credential Manager, is a small Java-based Web application using the aforementioned Single Sign-On client library to authenticate and authorize users. Once a user is authenticated, he can use the Credential Manager to create, modify and remove his external credentials.
Given the security validation necessary for every subject request (see Figure 2), it is easy to see why this interaction pattern constitutes a potential bottle neck, since a service provider needs to verify every request on secured resources with the security provider. At the very least, a service provider has to verify that a requesting subject is authenticated. It is safe to assume, that a service provider needs to verify a subject’s roles for authorization purposes. If trust delegation is employed, a service provider also has to retrieve a subject’s external credential(s) from the security provider. Thus, depending on the security verification pattern required by a service provider (see Figure 5), one subject request can necessitate three different request types with differently sized response data payloads to be made by a service provider to the security provider. In the context of a multi-user system where every user can make concurrent requests, it follows that the network connection between a service provider and the security provider constitutes a potential bottle neck. Hence, we decided on a client-side caching approach to reduce the amount of security verification requests necessary. To this end, each Single Sign-On client caches Client Session instances, a client-side representation of the session concept outlined in section 4.1 of this chapter. Whenever a user is signed on to the Single Sign-On domain via a Single Sign-On client, the Single Sign-On client creates a corresponding Client Session instance containing that subject’s authentication state, roles and external credentials and puts it into the cache. This cache is periodically refreshed with fresh values from the Single Sign-On server. Also, each client session is only populated with external credentials the service provider currently requires to fulfill respective subject requests requiring trust delegation towards external systems. Additionally, invalid cached sessions are detected and disposed of. The client session refresh and the cache clean-up intervals can be customized by the service provider. While this approach reduces the time spent on security verification requests, there is a disconnect between cached security state on the service provider’s side and actual security state on the security provider’s side. Thus, it is the service provider’s concern to choose respective values to strike a good balance between performance and security state consistency.
5 Interactive information extraction
In the past two sections we explained how the federation layer allows to access distributed data sources in a uniform way. In this section we illustrate how the federated data can also be semantically unified using an extraction framework that provides semi-supervised extraction methods. In addition, this serves as a use-case to illustrate how higher level services can make use of the federation layer to access large heterogeneously distributed data sets.
To explore the needs of users in real application scenarios, we work together with user groups from the humanities, for which large repositories of digitized textual data became available in recent years. In an example setting, we integrated their data into our federation layer and developed an interactive knowledge extraction system to help with the analysis of these large data sets. One goal in this domain is to cross-analyze the works of, or about particular figures, like famous authors. By identifying differently formulated references to semantically identical entities underlying semantic links between documents of different authorship can be discovered. For instance, when investigating the life, works and journeys of the famous writer Johann Wolfgang von Goethe in historical texts, references to the person Goethe may vary in different texts. In bibliographical texts he may be referenced by his full or partial name. In many letters, however, he is referred to as “Herr geheimer Rat”, a reference to an official position he held. Similarly, names of cities and places can change over time and even the formulations used to express certain facts can differ depending on the author’s writing style, the target audience of a text and the time of its creation.
Information extraction methods can link these variations by lifting entity references and statements indicating relations between such entities onto a semantically canonicalized level, where each entity as well as relations between entities are uniquely identifiable, i.e. it allows to represent knowledge expressed in texts in an ontological form.
This helps, for instance, to categorize and investigate large document collections and make them discoverable for non-experts, e.g. allowing to search or cluster documents by the referenced entities. It also allows to link information from different research areas, e.g. to enrich places mentioned by Goethe in his writings with geographical or historical information.
While information extraction on its own aims at semantic unification of varying textual representations, our federated framework allows for easier access to heterogeneously stored source data within a community as well as across different communities. By integration into the unified security and data access model, the extraction system needs not be aware of the concrete file system nor does it need to support different security methods. For instance, a user of one community may have access to files within its community stored on different grid systems, but also may cooperate with another community and thus have separate credentials to access some files of the other community. Since the federation level deals with all security issues, the extraction system only needs to know the single-sign-on (SSO) credentials to access files across both communities. This would, for instance, allow a researcher from the humanities to have access, and thus apply the extraction machinery, to works of or about Goethe held by different research groups or even data of other disciplines. Using the federation system he would only need his personal SSO account, given that the data owners granted access permissions and integrated their data with the federation system.
In the following we briefly discuss the extraction approach, what information it needs to function and how this information can be provided in an interactive way. Finally, we also discuss how the extraction components interact with the federation layer.
5.1 Knowledge extraction approach
The extraction framework we provide supports two levels of knowledge extraction.
The first level, commonly referred to as named entity recognition (NER), is usually understood as the problem to identify referenced entity types. For instance, occurrences of the strings “London” and “Frankfurt” in a text can be identified as references to locations and for occurrences like “Einstein” and “Goethe” the reference type could be person.
However, recent work in this field allows for uniquely identifying individual entities referenced in texts, given some background knowledge about the domain entities[39, 40]. This allows for identifying the string “Goethe” as a reference to the particular historical person named Johann Wolfgang von Goethe, a famous German writer. The same holds for other references, e.g. to locations. For instance, if the string “Frankfurt” appears in the same text about that particular writer it is probably a reference to the city Frankfurt on the Main, where Goethe was born, and not to Frankfurt on the Oder. The problem to decide which concrete entity is meant by a reference is called disambiguation.
To semantically unify different references to an identical entity in such a way, there are several basic requirements. First the system needs to have basic knowledge about the unique entities of a domain, i.e. it needs to know the famous writer Goethe existed. Secondly, type information is of importance, i.e. knowing that Goethe was a human, a writer and so on. Thirdly, the system needs to know which ‘names’ can potentially refer to which unique entities, e.g. the string “Frankfurt” could refer to at least two different cities within Germany. And finally, any additional relational information, e.g. where Goethe was born or which plays he wrote, can help to solve the disambiguation problem.
Based on this first step relations connecting recognized entities can be extracted from texts as well. Such relations might, for instance, be the birthplace of persons, the books a writer authored, or the movies an actor participated in. While there are different approaches [41–43], we apply an iterative pattern-based approach based on [43, 44] that aims at extracting instances of a fixed set of predefined binary relations.
A pattern in the most abstract sense is a recurring construct, e.g. a word phrasing or a tabular representation, expressing the abstract relations textually. For instance, consider the text “Goethe, who was born in Frankfurt, is one of the most famous German writers”. It contains an instance of the textual pattern “X, who was born in Y”. Assuming the system knows that all instances of this pattern express an abstract bornIn relation, it can derive a matching relation instance asserting that Goethe was born in Frankfurt. In learning relation instances and the links between patterns and relations the system follows an iterative approach. Using type information on relations and entities, the system learns from given example relation instances which patterns represent which of these relations by analyzing how well the instances of an observed textual pattern match the given instances of individual relations. Once a link between pattern and relation is established, these patterns can be applied to extract more relation instances, which provides the system with more examples to learn more patterns from and so on.
The approach has the advantage that the actual patterns and their meaning can be learned on the basis of examples. Thus a user needs no detailed understanding of the extraction process, he only needs to deal with ontological knowledge in which he is interested anyway. As discussed earlier, the system needs some domain knowledge to function, namely 1) the entities of the domain, 2) the names of the entities, 3) the types of the entities and relations, 4) example relation instances and 5) as much other relational information on entities as possible. While a user may provide all this information upfront, we find that users are typically more motivated to provide this information in an interactive way, as they can observe the impact of their feedback efforts. This also ensures only information needed by the extraction system is provided. Thus, in the following section we shall briefly discuss the interaction between a user and the extraction system and especially which kind of information he can provide during the extraction process in the form of feedback.
5.2 Interface interaction
Some domain specific background knowledge needs to be provided beforehand, in particular the type hierarchy, the relations of interest (with their range and domain types), and at least a basic set of entities along with some of their reference names. Additionally, the more relation instances are provided the more efficient the system can work.
Once this basic domain knowledge is provided, an interactive workflow allows to grow the knowledge base in a semi-automatic fashion.
First a set of relevant files is selected. The automatic extraction system searches for relevant information in the selected text basis and afterwards the user can inspect the recognized entity and relation instance occurrences and directly provide feedback on these occurrences. In particular the user can:
correct referenced entities
correct relations expressed between two entities
add new entity references
add new relation instance occurrences
In each of the given cases, the system implicitly learns from these corrections, e.g. by adding new reference names for an entity when an entity is corrected or directly derive relation instances when they are added or corrected. The accumulated knowledge can be applied when the extraction is re-run on the same or on a different data set. Coming back to the above-mentioned example the user needs only to indicate once that “Frankfurt” in a text does indeed reference Frankfurt on the Main, and the engine will very likely get it right in the whole text.
5.3 Integration into the resource federation architecture
In sections 3 and 4 we explained how the federation layer allows to access distributed data sources. By invoking a Single Sign-On (SSO) client within software components, services can be realized that interact with the system in behalf of the user. We have realized the previously described interactive knowledge extraction service to extract knowledge from accessible federated data using this method. The interaction of the extraction system with the federation layer is illustrated in Figure 6. After the user has registered the relevant credentials for the data sources in the SSO infrastructure using a Web Browser interface, the extraction system can access data sources using the central authentication and authorization provided by the Single Sign-On REST interface. All the user needs to provide are his SSO credentials and WebDAV URLs in the uniform name-space of the federation layer.
The extraction system can also make use of available computation power to distribute the extraction process over the unified job submission interface. To this end the system is split up in two main components, a master and a client part. While the master unit controls the distribution, the clients are executed as distributed jobs to parse all documents. Both parts access a central ontology store that manages all knowledge be it extracted or provided by users. This requires that the client is installed on the grid nodes and the resource federation interface for job control is implemented for the particular grid engine. After each iteration the extraction master presents the results to the user, who can provide feedback and re-run the extraction machinery so it can take the new feedback into account.
For the interaction with the extraction system a simple web-based user interface is provided on top of a web-service API allowing the implementation of more sophisticated front-ends, e.g. enabling integration into a particular workflow environment of any community.
This paper describes an architecture providing a uniform access layer for different resources like Grid data management systems or databases. Therefore, a combination of Web server, routing engine and WebDAV environment generates a uniform namespace. The routing engine processes the client requests, forwarded by the Web server, in a defined route and directs them to the WebDAV environment. There, the requests are answered in a WebDAV-compliant response by interacting with a resource-dependent connector that mediates between the resource and the WebDAV server. This concept is not restricted to data management systems, but also supports computing resources. An example based on the UNICORE Grid computing middleware was described in section 3.3.
We achieved our goal to provide a scalable and highly interoperable security system for use cases related to our resource federation system. The security model, realized by the Single Sign-On server and client components outlined in section 4.2, can be used by any service provider to access federated resources in a Single Sign-On manner, allowing for both Web browser and RESTful Web service access. This flexibility increases usability and paves the way for running computational studies on large interdisciplinary data sets as intended in section 1.
From a security standpoint, future work should be invested in adopting the findings outlined in , most of all the channel binding proposed in RFC 5929 as well as cross-domain SLSOP authentication cookies.
Both the resource federation system and the underlying security model form the basis to enable cross-organizational information extraction among distributed resources, which also benefits from uniform access to available computation resources. In addition to the uniform access achieved by the federation layer, an extraction system can provide a unified view on documents of different times, writing styles and potentially also languages by providing semantic meta-information.
Also, overall scalability must be put to the test in future work to gather significant and reliable performance data.
aThe specifications can be found online: http://webdav.org/specs/bUnique Resource Identifier
Cannataro M, Talia D, Srimani PK: Parallel data intensive computing in scientific and commercial applications. Parallel Computing 2002, 28(5):673–704. http://dx.doi.org/10.1016/S0167-8191(02)00091-1
Kouzes R, Anderson G, Elbert S, Gorton I, Gracio D: The changing paradigm of data-intensive computing. Computer 2009, 42(1):26–34. 10.1109/MC.2009.26
Bryant R: Data-intensive scalable computing for scientific applications. Computing in Science Engineering 2011, 13(6):25–33. 10.1109/MCSE.2011.73
Foster I, Kesselman C (eds): The grid: blueprint for a new computing infrastructure. San Francisco, CA, USA: Morgan, Kaufmann Publishers Inc.; 1999.
Venugopal S, Buyya R, Ramamohanarao K: A taxonomy of data grids for distributed data sharing, management, and processing. ACM Comput. Surv 2006., 38: http://doi.acm.org/10.1145/1132952.1132955
XSEDE: Extreme Science and Engineering Discovery Environment https://www.xsede.org/home
EGI, European Grid Infrastructure http://www.egi.eu/
D-Grid, The German Grid Initiative http://www.d-grid-gmbh.de/index.php?id=1%26L=1
WisNetGrid: WisNetGrid – Knowledge Networks for Grids Grid Project within the German Grid Initiative (D-Grid). Jäkel R (ed) Technische Universität Dresden, 2009. Web. 04. http://wisnetgrid.org
PubMed: PubMed. National Institutes of Health, 1996 http://www.ncbi.nlm.nih.gov/pubmed/
United Nations Environment Programme: Environmental Data Explorer The Environmental Database. N.p., n.d. Web. 04. http://geodata.grid.unep.ch/
Foster I, Zhao Y, Raicu I, Lu S: Cloud computing and grid computing 360-degree compared. In Grid Computing Environments Workshop, 2008. GCE ’08. New York,: ACM; 2008. pp 1–10. pp 1–10. 10.1109/GCE.2008.4738445
Cooper D, Santesson S, Farrell S, Boeyen S, Housley R, Polk W: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. 2008.http://tools.ietf.org/html/rfc5280 D-Grid, The German Grid Initiative.
XSede: Science Gateways via User Portal https://www.xsede.org/science-gateways
EGI, Science Gateways http://www.egi.eu/services/researchers/science-gateways/
Plantikow S, Peter K, Hgqvist M, Grimme C, Papaspyrou A: Generalizing the data management of three community grids. Future Generation Computer Systems 2009, 25(3):281–289. 10.1016/j.future.2008.05.001
EMI, European Middleware Initiative http://www.eu-emi.eu
Jie W, Arshad J, Sinnott R, Townend P, Lei Z: A review of grid authentication and authorization technologies and support for federated access control. ACM Comput. Surv 2011, 43: 12:1–12:26. http://doi.acm.org/10.1145/1883612.1883619
Farkas Z, Kacsuk P: P-grade portal: A generic workflow system to support user communities. Future Generation Computer Systems 2011, 27(5):454–465. 10.1016/j.future.2010.12.001
Novotny J, Tuecke S, Welch V: An online credential repository for the Grid: MyProxy. In: High Performance Distributed Computing, 2001. Proceedings. 10th IEEE International Symposium on, Internet2 Middleware Initiative 2001. pp 104 –111. pp 104 –111. 10.1109/HPDC.2001.945181
Tuecke S, Engert D, Foster I, Welch V, Chicago U, Thompson M, Pearlman L, Kesselman C: Internet X.509 Public Key Infrastructure Proxy Certificate Profile. 2001. Conference publication, Limerick, Revised July 2002
Guo Z, Singh R, Pierce M: Building the PolarGrid portal using Web 2.0 and OpenSocial. In Proceedings of the 5th Grid Computing Environments Workshop, GCE ’09. New York, NY, USA,: ACM; 2009. pp 5:1–5:8. pp 5:1–5:8. 10.1145/1658260.1658267
MosGrid: Molecular Simulation Grid https://mosgrid.de/portal
Gesing S, Grunzke R, Balaskó A, Birkenheuer G, Blunk D, Breuers S, Brinkmann A, Fels G, Herres-Pawlis S, Kacsuk P, Kozlovszky M, Krüger J, Packschies L, Schäfer P, Schuller B, Schuster J, Steinke T, Szikszay Fabri A, Wewior M, Müller-Pfefferkorn R, Kohlbacher O: Granular security for a science gateway in structural bioinformatics. In 3rd International Workshop on Science Gateways for Life Sciences (IWSG 2011), CEUR Workshop Proceedings, vol 819. Amsterdam: Elsevier Science Publishers B. V.; 2011. http://ceur-ws.org/Vol-819/
Recordon, David and Fitzpatrick, Brad: OpenID Authentification 1.1 (2006) http://openid.net/specs/openid-authentication-1_1.html
Internet2 Middleware Initiative: Shibboleth http://shibboleth.net
W3C Working Group: Web Services Architecture 2004.http://www.w3.org/TR/ws-arch/
OASIS Security Services TC: Security Assertion Markup Language (SAML) v2.0 (2005) âˆ–#samlv2.0 http://www.oasis-open.org/standards âˆ–#samlv2.0
NSF Middleware Initiative: GridShib http://gridshib.globus.org
Barton T, Basney J, Freeman T, Scavo T, Siebenlist F, Welch V, Ananthakrishnan R, Baker B, Goode M, Keahey K: Identity Federation and Attribute-based Authorization through the Globus Toolkit, Shibboleth, GridShib, and MyProxy. In: 5th Annual PKI R&D Workshop, IEEE Computer Society 2006.
NSF Middleware Initiative: GridShib SAML Tools (2008) http://gridshib.globus.org/docs/gridshib-saml-tools-0.5.0/readme.html
Schwenk J, Kohlar F, Amon M: The power of recognition: secure single sign-on using TLS channel bindings. In Proceedings of the 7th ACM workshop on Digital identity management, DIM ’11. New York, NY, USA,: ACM; 2011. pp 63–72. http://doi.acm.org/10.1145/2046642.2046656 pp 63–72.
Hypertext Transfer Protocol – HTTP/1.1 http://www.w3.org/Protocols/rfc2616/rfc2616.html
Benedyczak K, Baa P, van den Berghe S, Menday R, Schuller B: Key aspects of the unicore 6 security model. Future Generation Computer Systems 2011, 27(2):195–201. 10.1016/j.future.2010.08.009
Berry W: 15 seconds : Sharing cookies across domains. http://www.15seconds.com/issue/971108.htm
Fielding R, Taylor R: Principled design of the modern web architecture. In Software Engineering, 2000. Proceedings of the 2000 International Conference on. Amsterdam,: Elsevier Science Publishers B. V.; 2000. pp 407–416. pp 407–416. 10.1109/ICSE.2000.870431
W3C Working Group: libcurl - the multiprotocol file transfer library (2004) http://www.w3.org/TR/ws-arch/
Kulkarni S, Singh A, Ramakrishnan G, Chakrabarti S: Collective annotation of Wikipedia entities in web text. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD), University of Westminster, London. New York,: ACM; 2009. pp 457–466. http://doi.acm.org/10.1145/1557019.1557073 pp 457–466.
Yosef MA, Hoffart J, Spaniol M, Weikum G: Aida: An online tool for accurate disambiguation of named entities in text and tables. In Jagadish HV, Blakeley J, Hellerstein JM, Koudas N, Lehner W, Sarawagi S, Röhm U (eds.) Proceedings of the 37th International Conference on Very Large Data Bases, Proceedings of the VLDB Endowment, vol 4. Seattle, USA,: VLDB Endowment; 2011. pp 1450–1453 pp 1450–1453
Auer S, Bizer C, Kobilarov G, Lehmann J, Ives Z: DBpedia: A Nucleus for a Web of Open Data. In Proceedings of 6th International Semantic Web Conference, 2nd Asian Semantic Web Conference (ISWC+ASWC 2007), Vol. 4825. Amsterdam,: Elsevier Science Publishers B. V.; 2007. pp 11–15 pp 11–15
Brin S: Extracting Patterns and Relations from the World Wide Web. In Workshop on The World Wide Web and Databases (WebDB) at 6th International Conference on Extending Database Technology (EDBT). Valencia,: Springer-Verlag; 1999. pp 172–183 pp 172–183
Suchanek FM, Sozio M, Weikum G: SOFIE: A Self-Organizing Framework for Information Extraction. In WWW’09 : proceedings of the 18th International World Wide Web Conference. Madrid: ACM; 2009.
Elbassuoni S, Hose K, Metzger S, Schenkel R: Roxxi: Reviving witness dOcuments to eXplore eXtracted Information. In Proceedings of the 36th International Conference on Very Large Data Bases, Proceedings of the VLDB Endowment, vol 3. Singapore,: ACM; 2010. pp 1589–1592 pp 1589–1592
The architecture described in this work is being developed as part of the German D-Grid project WisNetGrid (http://wisnetgrid.org) and is funded by the German Federal Ministry of Education and Research (BMBF).
The authors declare that they have no competing interests.
MD led architecture, design and implementation of the security system, communication and integration components, contributed to the original scenario integration and literature study, consulted on the resource federator architecture, authored sections 4 and 6, co-authored sections 1 and 2 and assumed proofreading responsibilities. DH led architecture, design and implementation of the resource federator, contributed to the original scenario integration and literature study, consulted on the security system architecture, authored section 3 and assumed proofreading responsibilities. RJ drafted the manuscript and original scenario integration plus literature study and contributed to the resource federation and extraction system. SM designed and implemented the extraction framework integration and contributed to the corresponding paper section. BS contributed to architecture, design and implementation of the resource federator and provided the UNICORE integration. RMP contributed to the architecture conception. All authors read and approved the final manuscript.
Authors’ original submitted files for images
About this article
Cite this article
Daivandy, M., Hünich, D., Jäkel, R. et al. Heterogeneous resource federation with a centralized security model for information extraction. J Internet Serv Appl 4, 10 (2013). https://doi.org/10.1186/1869-0238-4-10
- Grid computing
- Data federation
- Metadata federation
- Resource federation
- Single sign-On
- Identity federation centralized security
- Identity management
- Trust delegation
- Uniform access
- Information extraction
- Knowledge extraction