Security-Assured Resource Allocation for Trusted Grid Computing*

نویسندگان

  • Shanshan Song
  • Kai Hwang
  • Rakesh Rajbanshi
چکیده

A new trust-based model is developed for optimizing resource allocation in a distributed Grid computing environment. Highly shared resources in a Grid create the insecurity and dependability concerns that hinder distributed applications. We model the Grid resource allocation process as a multi-objective integer-programming problem. Trusted Grid computing power is maximized over multiple resources. At the same time, the aggregate cost of Grid services is minimized to yield a high performance/cost ratio. Our new Security-Assured Resource Allocation (SARA) scheme enables dynamic resources under the security constraints. The Grid resources are assured with a distributed security infrastructure. First, we present the mathematical model for SARA optimization process. Then we use the Simplex method and branch-and-bound method to obtain optimal or suboptimal solutions. We illustrate the ideas with a working example of a pool of 11 host machines from 2 resource sites. For k resource sites with N machine hosts, our SARA algorithm has a search complexity O(2N/k), which is much lower than O(2) in exhaustive search for the optimal solutions. Our model can be applied to secure many Grid applications in scientific supercomputing or in cyberspace information services.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trusted Resource Allocation in Grid Computing by Using Reputation

Grid system is a dynamic environment where every entity share the resources provided by the other entities. The system enables the coordinated and aggregated use of geographically distributed resources, often owned by autonomous organizations, for solving large-scale problems in science, engineering. However, application composition, resource management and scheduling in these environments is a...

متن کامل

Secure Admission Control for Resolving Wireless Congestion in Grid Computing*

Mobile clients and wireless accessed resources cannot be ignored in building a Grid computing infrastructure. Today’s wireless networks experience the problems of having low QoS and high security risks. Noted problems include intermittent disconnections, high packet drop rate, security flaws, etc. These problems must be solved to enable integrated Grid computing services. The existing different...

متن کامل

Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation

This paper highlights the need to meet both Grid user and resource provider security requirements, describing the rationale for securing Grid workflows: a set of tasks arranged into a logical order to process a Grid user’s dataset. An overview of a secure protocol using Trusted Computing technology is provided, which is further enhanced with platform virtualisation hardware and software. The pr...

متن کامل

Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology

A critical problem for grid security is how to gain secure solution for Grid virtual organization (VO). In Grid practice at present, issues of VO security rely on non-distributed policy management and related PKI mechanism. A practical but difficult solution is to enforce fine granularity policy over distributed sites. The emerging Trusted Computing (TC) technologies offer great potential to im...

متن کامل

Enhancing Grid Security Using Trusted Virtualization

Grid applications have increasingly sophisticated functional and security requirements. However, current techniques mostly protect only the resource provider from attacks by the user, while leaving the user comparatively dependent on the well-behavior of the resource provider. In this paper, we take the first steps towards addressing the trust asymmetry by using a combination of trusted computi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003