Cost-Effective Private Grid Using Object-based Grid Architecture
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32797
Cost-Effective Private Grid Using Object-based Grid Architecture

Authors: M. Victor Jose, V. Seenivasagam

Abstract:

This paper proposes a cost-effective private grid using Object-based Grid Architecture (OGA). In OGA, the data process privacy and inter communication are increased through an object- oriented concept. The limitation of the existing grid is that the user can enter or leave the grid at any time without schedule and dedicated resource. To overcome these limitations, cost-effective private grid and appropriate algorithms are proposed. In this, each system contains two platforms such as grid and local platforms. The grid manager service running in local personal computer can act as grid resource. When the system is on, it is intimated to the Monitoring and Information System (MIS) and details are maintained in Resource Object Table (ROT). The MIS is responsible to select the resource where the file or the replica should be stored. The resource storage is done within virtual single private grid nodes using random object addressing to prevent stolen attack. If any grid resource goes down, then the resource ID will be removed from the ROT, and resource recovery is efficiently managed by the replicas. This random addressing technique makes the grid storage a single storage and the user views the entire grid network as a single system.

Keywords: Object Grid Architecture, Grid Manager Service, Resource Object table, Random object addressing, Object storage, Dynamic Object Update.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1111909

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 976

References:


[1] M. Victor Jose, and V. Seenivasagam, “Object Based Grid Architecture for Enhancing Security in Grid Computing,” in 2011 IEEE Proc. ICSCCN, pp 414-417.
[2] Foster, Ian, “Globus Toolkit Version 4: Software for Service-Oriented Systems,” IFIP Int. Conf. on Network and Parallel Computing, Springer-Verlag LNCS 3779, pp 2-13, 2005.
[3] Foster Ian, “WS-Resource Framework: Globus Alliance Perspectives,” GlobusWORLD, Jan 2004.
[4] I. Foster, C. Kesselman, and S. Tuecke, “The Anatomy of the Grid: Enabling Scalable Virtual Organizations”. International Journal of High Performance Computing Applications, vol. 15, no. 3, pp. 200–222, 2001.
[5] K. Keahey, T. Fredian, D.P. Peng, M. Schissel. Thompson, I. Foster, M. Greenwald, and D. McCune, “Computational Grids in Action: The National Fusion Collaboratory”, Future Generation Computer System, vol. 18, no. 8, pp. 1005–1015, Oct. 2002.
[6] I. Blanquer, V. Hern´andez, D. Segrelles, “Enhancing Privacy and Authorization Control Scalability in the Grid Through Ontologies” IEEE Tansactions on information technology in biomedicine, vol. 13, no. 1, PP 16-24, Jan 2009.
[7] M. Victor Jose, and V. Seenivasagam, “Four Factor Secure Authentication and Authorization for Economic Grid,” Research Journal of Applied Sciences, Engineering and Technology, vol. 7, no. 11, PP. 2253-2260, March 2014.
[8] M. Victor Jose, and V. Seenivasagam, “Enhancing Security in Resource Sharing Using Key Holding Mechanism,” World Academy of Science, Engineering and Technology, International Journal of Computer, Information Systems and Control Engineering, vol. 8, no. 10, pp. 1691-1697, Dec 2014.
[9] Anlong Ming, and Huadong Ma, ‘The Biometrics Grid: A Solution to Biometric Technologies’, IEEE Distributed Systems Online, vol. 8, no. 9, pp. 1-14, 2007.
[10] J. Montagnat, A. Frohner, D. Jouvenot, C. Pera, P. Kunszt, C. L. Texier, P. Guio, R. B. Rocha, S. Almeida, and, Z. Farkas, “A Secure Grid Medical Data Manager Interfaced to the gLite Middleware”, Journal of Grid Computing, vol. 6, no. 1, pp. 45-59,2008.
[11] I. Blanquer, V. Hernandez, and D. Segrelles, “Enhancing Privacy and Authorization Control Scalability in the grid through Ontologies”, IEEE Transactions on information technology in biomedicine, vol. 13, no. 1, PP. 16-24, 2009.
[12] Shun-Hsien Huang, John Dumas, Carlos González-Pérez and Wei-Jen Lee, “Grid Security through Load Reduction in the ERCOT Market”, IEEE Transactions on Industry Applications, vol. 45, no. 2, pp. 555-559, 2009.
[13] B. R.Amarnath, S. Thamaraiselvi, M. Ellappan, and R. Buyya, “Ontology-based Grid resource Management”, Software Practice and Experience, vol.39, no.17, pp. 1419–1438, 2009.
[14] M. Smith, M. Schmidt, N. Fallenbeck, T. Dörnemann, C Schridde, and B. Freisleben, “Secure on-demand grid computing”, Future Generation Computer Systems Journal, vol. 25, no. 3, pp. 315-325, 2009.
[15] J. Calvillo, I, Roman, S. Rivas, and L.M. Roa, “Privilege Management Infrastructure for Virtual Organizations in Healthcare Grids” IEEE Transactions on information technology in biomedicine, vol. 15, no. 2, pp. 316- 323, 2011.