Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33093
Secure Resource Selection in Computational Grid Based on Quantitative Execution Trust
Authors: G.Kavitha, V.Sankaranarayanan
Abstract:
Grid computing provides a virtual framework for controlled sharing of resources across institutional boundaries. Recently, trust has been recognised as an important factor for selection of optimal resources in a grid. We introduce a new method that provides a quantitative trust value, based on the past interactions and present environment characteristics. This quantitative trust value is used to select a suitable resource for a job and eliminates run time failures arising from incompatible user-resource pairs. The proposed work will act as a tool to calculate the trust values of the various components of the grid and there by improves the success rate of the jobs submitted to the resource on the grid. The access to a resource not only depend on the identity and behaviour of the resource but also upon its context of transaction, time of transaction, connectivity bandwidth, availability of the resource and load on the resource. The quality of the recommender is also evaluated based on the accuracy of the feedback provided about a resource. The jobs are submitted for execution to the selected resource after finding the overall trust value of the resource. The overall trust value is computed with respect to the subjective and objective parameters.Keywords: access control, feedback, grid computing, reputation, security, trust, trust parameter.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1077169
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1487References:
[1] Foster. I, Kesselman.C and Tuecke.S, "The anatomy of the grid: Enabling scalable virtual organizations", International Journal of High performance computing Applications,V.15 n.3,August 2001, pp. 200- 222.
[2] Foster.I , Kesselman.C , Nick.J, Tuecke.S, "The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration", Open Grid Service Infrastructure WG,Global Grid Forum, June 22, 2002,pp 37-46.
[3] Ching Lin,Vijay Varadharajan, Yan Wang, Vineet Pruthi, "Enhancing Grid security with trust management", Proc.Of IEEE International Conference on Services Computing ,2004, pp 303-310.
[4] Farag.A.Azzedin and Maheswaran.M , "Evolving and managing trust in grid computing systems", Proceedings of the 2002 IEEE Canadian Conference on Electrical Computer Engineering, 2002, pp 1424-1429.
[5] Abdul-Rahman.A and Hailes.S, Supporting trust in virtual communities," Hawaii Int-l Conference on System Sciences, Jan. 2000, pg.6007.
[6] Indrajit Ray and Sudip Chakraborty, "A Vector model of trust for developing trustworthy systems",Proc.Of 9th European Symposium on Research in Computer Soceity, 2004, pp 260-275.
[7] Xudong Ni , Junzhou Luo, " A Trust aware access control in serviceoriented grid environment", International Conference On Grid and Cooperative Computing ,2007, pp 417-422.
[8] Li Xiong, Ling Liu "A Reputation based trust model for peer-to-peer ecommerce communities",Proc.Of the IEEEconference on ecommerce, June 2003.
[9] Thamaraiselvi.S, Balakrishnan.P, Kumar.R, Rajendar.K, "Trust based Grid scheduling algorithm for commercial grids" ,International Conference on Computational Intelligence and Multimedia Applications,2007, pp 545-558.
[10] Yao Wang, Julita Vassileva ," A Review on Trust and Reputation for Web Service Selection" , 27th International Conference on Distributed Computing Systems Workshops ,2007, pg.25.
[11] Marty Humphrey , Mary R..Thompson ," Security Implications Of Typical Grid Computing Usage Scenarios ", Proc. Of 10th IEEE International Symposium on High Performance Distributed Computing, 2001, pg.0095.
[12] Michael Brinklov ,Robin Sharp, " Incremental Trust in Grid Computing "7th IEEE International Symposium on Cluster Computing and the Grid,2007, pp 135-144.
[13] Vijayakumar.V , Wahida Banu.R.S.D , " Security for Resource Selection in Grid Computing Based on Trust and Reputation Responsiveness", International Journal of Computer Science and Network Security, November 2008 ,pp 107-115.
[14] Isaac Agudo, Carmen Fernandez, Javier Lopez," An Evolutionary Trust and Distrust Model " , Electronic notes in Theoretical Computer Science,2009, pp 3-12.
[15] Bendahmane. A, Essaidi.M , A. El Moussaoui, Younus.A , "Grid Computing Security Mechanisms: State-Of-The-Art" , ICMCS 2009, pp 4-10.
[16] Ryutov.T, Neumann.C ,Zhou.L , " Adaptive Trust Negotiation and Access Control For Grids" , International Conference on Grid Computing ,2005, pp 55-62.
[17] Muhammad Hanif Durad, Yuanda Cao, "A Vision for the Trust Managed Grid," , Sixth IEEE International Symposium on Cluster Computing and the Grid Workshops (CCGRIDW'06), 2006, pg.34.
[18] Papalilo E. and Freisleben B., "Towards a Flexible Trust Model for Grid Environments" GSEM 2004, LNCS 3270 Springer- Verlag Berlin Heidelberg 2004, pp. 94-106.
[19] Runfang Zhou and Kai Hwang, "Trust Overlay Networks for Global ReputationAggregation in P2P Grid Computing", IEEE International Parallel and Distributed Processing Symposium, IPDPS ,2006,pg.10.