Secure Resource Selection in Computational Grid Based on Quantitative Execution Trust

Grid computing provides a virtual framework for controlled sharing of resources across institutional boundaries. Recently, trust has been recognised as an important factor for selection of optimal resources in a grid. We introduce a new method that provides a quantitative trust value, based on the past interactions and present environment characteristics. This quantitative trust value is used to select a suitable resource for a job and eliminates run time failures arising from incompatible user-resource pairs. The proposed work will act as a tool to calculate the trust values of the various components of the grid and there by improves the success rate of the jobs submitted to the resource on the grid. The access to a resource not only depend on the identity and behaviour of the resource but also upon its context of transaction, time of transaction, connectivity bandwidth, availability of the resource and load on the resource. The quality of the recommender is also evaluated based on the accuracy of the feedback provided about a resource. The jobs are submitted for execution to the selected resource after finding the overall trust value of the resource. The overall trust value is computed with respect to the subjective and objective parameters.




References:
[1] Foster. I, Kesselman.C and Tuecke.S, "The anatomy of the grid:
Enabling scalable virtual organizations", International Journal of High
performance computing Applications,V.15 n.3,August 2001, pp. 200-
222.
[2] Foster.I , Kesselman.C , Nick.J, Tuecke.S, "The Physiology of the Grid:
An Open Grid Services Architecture for Distributed Systems
Integration", Open Grid Service Infrastructure WG,Global Grid Forum,
June 22, 2002,pp 37-46.
[3] Ching Lin,Vijay Varadharajan, Yan Wang, Vineet Pruthi, "Enhancing
Grid security with trust management", Proc.Of IEEE International
Conference on Services Computing ,2004, pp 303-310.
[4] Farag.A.Azzedin and Maheswaran.M , "Evolving and managing trust in
grid computing systems", Proceedings of the 2002 IEEE Canadian
Conference on Electrical Computer Engineering, 2002, pp 1424-1429.
[5] Abdul-Rahman.A and Hailes.S, Supporting trust in virtual
communities," Hawaii Int-l Conference on System Sciences, Jan. 2000,
pg.6007.
[6] Indrajit Ray and Sudip Chakraborty, "A Vector model of trust for
developing trustworthy systems",Proc.Of 9th European Symposium on
Research in Computer Soceity, 2004, pp 260-275.
[7] Xudong Ni , Junzhou Luo, " A Trust aware access control in serviceoriented
grid environment", International Conference On Grid and
Cooperative Computing ,2007, pp 417-422.
[8] Li Xiong, Ling Liu "A Reputation based trust model for peer-to-peer ecommerce
communities",Proc.Of the IEEEconference on ecommerce,
June 2003.
[9] Thamaraiselvi.S, Balakrishnan.P, Kumar.R, Rajendar.K, "Trust based
Grid scheduling algorithm for commercial grids" ,International
Conference on Computational Intelligence and Multimedia
Applications,2007, pp 545-558.
[10] Yao Wang, Julita Vassileva ," A Review on Trust and Reputation for
Web Service Selection" , 27th International Conference on Distributed
Computing Systems Workshops ,2007, pg.25.
[11] Marty Humphrey , Mary R..Thompson ," Security Implications Of
Typical Grid Computing Usage Scenarios ", Proc. Of 10th IEEE
International Symposium on High Performance Distributed Computing,
2001, pg.0095.
[12] Michael Brinklov ,Robin Sharp, " Incremental Trust in Grid Computing
"7th IEEE International Symposium on Cluster Computing and the
Grid,2007, pp 135-144.
[13] Vijayakumar.V , Wahida Banu.R.S.D , " Security for Resource Selection
in Grid Computing Based on Trust and Reputation Responsiveness",
International Journal of Computer Science and Network Security,
November 2008 ,pp 107-115.
[14] Isaac Agudo, Carmen Fernandez, Javier Lopez," An Evolutionary Trust
and Distrust Model " , Electronic notes in Theoretical Computer
Science,2009, pp 3-12.
[15] Bendahmane. A, Essaidi.M , A. El Moussaoui, Younus.A , "Grid
Computing Security Mechanisms: State-Of-The-Art" , ICMCS 2009, pp
4-10.
[16] Ryutov.T, Neumann.C ,Zhou.L , " Adaptive Trust Negotiation and
Access Control For Grids" , International Conference on Grid
Computing ,2005, pp 55-62.
[17] Muhammad Hanif Durad, Yuanda Cao, "A Vision for the Trust
Managed Grid," , Sixth IEEE International Symposium on Cluster
Computing and the Grid Workshops (CCGRIDW'06), 2006, pg.34.
[18] Papalilo E. and Freisleben B., "Towards a Flexible Trust Model for Grid
Environments" GSEM 2004, LNCS 3270 Springer- Verlag Berlin
Heidelberg 2004, pp. 94-106.
[19] Runfang Zhou and Kai Hwang, "Trust Overlay Networks for Global
ReputationAggregation in P2P Grid Computing", IEEE International
Parallel and Distributed Processing Symposium, IPDPS ,2006,pg.10.