Trust Models in Grid Computing: A Review

Page: [94 - 100] Pages: 7

  • * (Excluding Mailing and Handling)

Abstract

Background: Grid computing relates to a pool of resources to be shared by users in Grid Environment. Security of the resources from users and vice-versa is a significant issue. This is where the notion of trust comes into existence. A number of researchers have proposed models for evaluation of trust in grid computing, but they fail to spot one or the other parameters for trust evaluation. The essence of trust models in grid computing is that they offer autonomic trust management. An autonomic trust model has been patented by Z. Yan and C. Prehofer in 2009. Another patent was published by Anna University in 2010 to evaluate the trustworthiness of a resource provider in Grid environment.

Objective: This paper firstly focuses and illustrates these essential parameters. Based on these parameters, further, a comparison of some existing models for trust evaluation is shown. Finally, common parameters missed out by various models have been highlighted giving way for improvements of Trust model.

Methods: A Trust evaluation model has been proposed by us previously based on a number of real-world trust evaluation parameters. This model sees trust as a three-dimensional entity. Trust is based on Dempter Shafer’s theory in which trust is calculated mathematically.

Results: Software trust needs to be calculated mathematically. There are a large number of real-world parameters that need to be included for evaluating trust.

Conclusion: As trust models in research are based on simulation techniques, so it is important to include real-world factors that affect trust value of one entity on other. Some of those parameters, missed by most of the models have been identified for inclusion in future trust models.

Keywords: Grid computing, trust, reputation, trust decay, trust evaluation, risk.

Graphical Abstract

[1]
P. Dabas, and A. Arya, "Grid computing: an introduction", Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 3, pp. 466-470, 2013.
[2]
R. Buyya, and S. Venugopal, "A gentle introduction to grid computing and technologies", CSI Commun., vol. 29, pp. 9-19, 2005.
[3]
T. Foster, C. Kesselman, and S. Tuecke, "The anatomy of the grid: enabling scalable virtual organizations”, ‎", Int. J. High Perform. Comput. Appl., vol. 2150, pp. 6-7, 2001.
[4]
D. Olmedilla, O.F. Rana, B. Matthews, and W. Nejd, "Security and trust issues in semantic grids", In Proceedings of the Dagstuhl Seminar, Semantic Grid: The Convergence of Technologies, Oktavie-Allee, Germany,, 2005
[5]
S. Seema, A.V. Singh, and D. Sharma, "Classification of authorization systems in grid environment", In: International Advance Computing IEEE Conference IACC-2009 held at Thapar University Thapar , 2009, pp. 309-3098.
[6]
S. Seema, and D. Sharma, "An access control framework for grid environment", Indian J. Comput. Sci. Eng., vol. 2, pp. 937-948, 2012.
[7]
S. Singh, and S. Bawa, "A framework for handling security issues in grid environment using web services security specifications", Second International Conference on semantics, knowledge & Grid(SKG2006).Guilin, China, 2006, pp. 67-68.
[8]
Y. Xia, Y. Zheng, and Y. Li, A public grid computing framework based on a hierarchical combination of middleware.In Advanced Web and Network Technologies, and Applications..H.T. Shen, J. Li, M. Li, J. Ni, and W. Wang, Ed. Berlin, Heidelberg, Springer, vol. 3842, 2006, pp. 682-689.
[9]
P. Arora, and H. Arora, "A review of various grid middleware technologies", In J. Adv. Res. Comput. Sci. Software Eng.. vol. 2, pp. 6-11, 2012.
[10]
P. Rosemarry, P. Singhal, and R. Singh, "A study of various job & resource scheduling algorithms in grid computing", Int. J. Comput. Sci. Info. Technol., vol. 3, pp. 5504-5507, 2012.
[11]
R. Wankar, "Grid computing with globus: an overview and research challenges", Int. J. Comput. Sci. Appl., vol. 5, pp. 56-69, 2008.
[12]
M.A. Hussain, M. Naser, A.U. Begum, N. Shaik, and M. Shaik, "Datamining with grid computing concepts", Am. J. Eng. Res., vol. 4, pp. 256-260, 2015.
[13]
K.A. Manjula, and G. Raju, “A study on applications of grid computing in bioinformatics”, JCA Special Issue on Computer Aided Soft Computing Techniques for Imaging and Biomedical Applications., CASCT, 2010, pp. 69-72.
[14]
J.C. Browne, "Grid computing as applied distributed computation: A graduate seminar on Internet and grid computing", In: IEEE International Symposium on Cluster Computing and the Grid.2004, Chicago, IL, USA, 2004, pp. 239-245.
[15]
J. Cheng, and W. Li, "Research of the application of Grid computing on geographical information system", IEEE International Conference on Network Infrastructure and Digital Content.Beijing, China 2009
[16]
J. Andrade, M. Andersen, L. Berglund, and J. Odeberg, "Applications of grid computing in genetics and proteomics", In: Applied Parallel Computing. State of the Art in Scientific Computing..Lecture Notes in Computer Science, B. Kågström, E. Elmroth, J. Dongarra, J. Waśniewski, Ed. Berlin, Heidelberg: Springer, vol. 4699, 2006, pp. 791-798.
[17]
B.M. Boghosian, and P.V. Coveney, "Scientific applications of grid computing", Comput. Sci. Eng., vol. 7, pp. 10-13, 2005.
[18]
D. Sharma, S. Singh, and S. Mudgil, "An approach to find trustworthiness among different domains in a grid environment", Int. J. Adv. Res. Comput. Sci., vol. 1, pp. 474-482, 2010.
[19]
D. Sharma, S. Singh, A. Verma, and S. Mudgil, "A comprehensive approach to trust management in grid computing", IEEE International Conference IACC.Thapar University, Patiala, India,, 2009, pp. 3105-3110.
[20]
Z. Yan, and C. Prehofer, Autonomic trust management for a trustworthy system. U.S. Patent 20090049514A1, 2009.
[21]
S.T. Selvi, R. Kumar, P. Balakrishnan, R.A. Balachandar, K. Rajendar, J.S. Swarnapandian, G. Kannan, R. Rajiv, and E. Mahendran, A system and a method to access the trustworthiness of a resource provider.IP Patent 240895, 2010
[22]
P.S. Kumar, and S. Ramachandram, "Recent trust models in grid", J. Theor. Appl. Inf. Technol., vol. 26, pp. 64-68, 2011.
[23]
T. Grandison, and M. Sloman, "A survey of trust in internet applications", IEEE Comm. Surv. Tutor., vol. 3, pp. 2-16, 2000.
[24]
A.A. Rahman, and S. Hailes, "Supporting trust in virtual communities", Hawaii International Conference on System Sciences.Maui, HI, USA 2000, pp. 6007.
[25]
F. Azzedin, and M. Maheswaran, "Trust modeling for peer-to-peer based computing systems", In: Proceedings of the International Parallel and Distributed Processing Symposium.(IPDPS’03), Linkoping, Sweden, Sweden, 2003, pp. 150.
[26]
S. Lee, R. Sherwood, and B. Bhattacharjee, Cooperative peer groups in NICEIn IEEE Infocom, San Francisco, CA,. 2003, pp. 1-17.
[27]
C. Lin, V. Varadharajan, Y. Wang, and V. Pruthi, "Enhancing grid security with trust management", In Proceedings of the 2004 IEEE International Conference on Services Computing.(SCC’04), Shanghai, China, 2004, pp. 303-310.
[28]
Z. Liang, and W. Shi, "PET: A personalized trust model with reputation and risk evaluation for P2P resource sharing", In: Proceedings of the 38th Hawaii International Conference on System Sciences, Big Island, HI, USA, 2005, pp. 1-11.
[29]
J.R.D. Dyson, N.E. Griffiths, L.C. Keung, S.A. Jarvis, and G.R. Nudd, "Trusting agents for grid computing", IEEE International Conference on Systems, Man and Cybernetics.The Hague, Netherlands 2004, pp. 3187-3192
[30]
F. Azzedin, and M. Muthucumaru, "Evolving and managing trust in grid computing systems", In: Proceedings of the 2002 IEEE Canadian Conference on Electrical Computer EngineeringWinnipeg, Manitoba, Canada, . 2002, pp. 1-6.
[31]
S. Siadat, A.M. Rahmani, and M. Mohsenzadeh, "Proposed platform for improving grid security by trust management system", Int. J. Comput. Sci. Info. Secur, vol. 6, pp. 143-148, 2009.
[32]
A. Anitha, "Trust management in grid-trust assessment and trust degree calculation of a resource-a novel approach", J. Comput. Mediat. Commun., vol. 3, pp. 34-41, 2015.
[33]
P. Vivekananth, "Eigen trust algorithm for resource selection in grid computing", Int. J. Comput. Appl., vol. 16, pp. 50-54, 2011.
[34]
V. Vijayakumar, and R.S.D. Wahidabanu, "Performance evaluation of grid computing in trust related environment", Int. J. Comput. Sci. Info. Technol., vol. 2, pp. 2503-2506, 2011.
[35]
B.B. Kodada, R. Nayak, R. Prabhu, and D. Suresha, "Intrusion detection system inside grid computing environment (IDS-IGCE)", Int. J. Grid Comput. Appl., vol. 2, pp. 27-35, 2011.
[36]
M. Witold, " and J. lkowicz, “A grid-aware intrusion detection system”, IMM- thesis, Technical University of Denmark, Kongens Lyngby", 2007
[37]
T.F. Lunt, "Detecting intruders in computer system", In: Proceedings of the 1993 Conference on Auditing and Computer TechnologyMenlo Park, California, . 1993, pp. 1-17.
[38]
R. Alsoghayer, and K. Djemame, "Probabilistic risk assessment for resource provision in grids", Proceedings of the 25th UK Performance Engineering Workshop.Leeds, UK, 2009, pp. 99-110.
[39]
"C. Carlsson, and R. Fullér, “Risk assessment in grid computing", In Possibility for Decision, Studies in Fuzziness and Soft Computing.. Berlin, Heidelberg: Springer, vol. 270, 2011, pp. 145-165.
[40]
S. Abdelwahab, and A. Abraham, "Risk assessment for Grid Computing using Meta-Learning ensembles", In: Pattern Analysis, Intelligent Security and the Internet of Things, Advances in Intelligent Systems and Computing.. A. Abraham, A. Muda, Y. H. Choo, Ed. Cham: Springer, vol. 355 2015, pp. 251-260.
[41]
F. Papalilo, Distributed trust management in grid computing environments., Philipps-Universität Marburg: Marburg, 2008.
[42]
J. Kohlas, and P.A. Monney, "Theory of evidence - a survey of its mathematical foundations, applications and computational anaylsis", Math. Methods Oper. Res., vol. 39, pp. 35-68, 1994.
[43]
A. Josang, "A logic for uncertain probabilities", In.J. Uncertain. Fuzz.. vol. 9, pp. 279-311, 2001.
[44]
A. Farouk, M.M. Fouad, and A.A. Abdelhafez, "Cross-domain identity trust management for grid computing", Int. J. Secur. Privacy Trust Manage., vol. 3, pp. 11-21, 2014.
[45]
M. Ashok, and S. Sathiyan, A parameterized framework of trust computation for grid resource broker., In Global Trends in Computing and Communication Systems, Communications in Computer and Information Science..P. V. Krishna, M. R. Babu, E. Ariwa, Ed. Berlin, Heidelberg: Springer, vol. 269, 2012, pp. 178- 181.
[46]
M.N. Siddiqui, V. Saini, and R. Ahuja, "Trust management for grid environment using rule based fuzzy logic", Adv. Netw. Secur. Appl., vol. 196, pp. 649-657, 2011.