Fig. 3 demonstrates the authentication procedure and the interaction between the components of the designed security framework. The whole work flow consists of the following main phases: user authentication, proxy credential assignment, preparing authentication information on the master node, authentication of the master node and slave nodes, as well as job execution, termination, and disconnection.