ABSTRACT
Regardless of how inexpensive hardware becomes, building a high-powered cluster computing
environment is out of the reach of many organizations and individuals. Analyzing large chunks of
data may require more CPU cycles and memory than an organization has in its arsenal. Enter grid
computing: for a reasonable fee, and depending on the type and quantity of resources needed, a company
can “rent” grid time from IBM and Sun Micro Systems. It is a beautiful concept: the power of a Big Blue
for the price of a middle-tier server. The concept of grid computing has evolved in the past 30 years. In
this short time, the idea of utilizing unused processing cycles across a network for purposes other than
what they were originally intended for has gone from a beautiful thought to reality. This paper discusses
the evolution of grid computing, emphasizing security issues and standards that have risen as the direct
result of its popularity. It reviews major developments in standardizing grid access and authentication,
their strength and weaknesses, current vulnerabilities, and paths to the future.