Reputation-based Majority Voting for Malicious Grid Resources Tolerance

نویسندگان

  • Ahmed Bendahmane
  • Mohammed Essaaidi
  • Ahmed El Moussaoui
  • Ali Younes
چکیده

Recently, distributed computing infrastructures such as grid computing, have witnessed huge developments which have a very important impact on computationally intensive scientific, industrial and engineering problems. Collaborative computing, resources access and sharing facilitated by grid computing systems amplifies concerns about cyber attacks and misbehaviors of grid resources (resources provider). In many cases, an organization may send out jobs for remote execution on untrustworthy machines. Since resource sharing and cooperation among different administrative domains are among the central goals of grid computing, it is necessary to guarantee that, among the shared resources, there are no malicious resources interested in invalidating or corrupting the job results. In order to guarantee reliable jobs execution in grid systems, we have developed a new approach for malicious grid resources tolerance using reputation to improve the efficiency of majority voting mechanisms. The grid broker service investigates the trustworthiness of the grid resources used in the voting procedure; this investigation is based on distributed and hierarchical reputation management system which maintains a reputation value for each grid resource based on its historical behavior. The validation of the result is then decided based on the grid resources reputation level.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fault Tolerance within a Grid Environment

Fault tolerance is an important property in Grid computing as the dependability of individual Grid resources may not be able to be guaranteed; also as resources are used outside of organizational boundaries, it becomes increasingly difficult to guarantee that a resource being used is not malicious in some way. As part of the e-Demand project at the University of Durham we are seeking to develop...

متن کامل

Malicious Workers Tolerance in an Agent-based Grid Resource Brokering System

The Agent in Grid (AiG) project aims to develop an agent-based infrastructure that facilitates the resource management in the Grid. The core assumptions behind the system are: software agents representing Grid resources work in teams, and all information is ontologically represented and semantically processed. Thus far, trust management in AiG system is approached from the perspective of breach...

متن کامل

Distributed Reputation-based Secure Localization in Sensor Networks

Wireless Sensor Networks (WSNs) have critical applications in diverse domains like environmental monitoring and military operations like target tracking and land-mine detection where accurate location of sensors is vital. One common method of localization in literature uses a set of specialty nodes known as beacon nodes (BNs) that assist other sensor nodes (SNs) to determine their location. In ...

متن کامل

Defend mobile agent against malicious hosts in migration itineraries

Agent integrity verification and fault-tolerance are the two prevalent methods among the solutions to the Problem of Malicious Hosts in Mobile agent system. Agent integrity verification enables the owner of the agent to detect upon its return whether a visited host has maliciously altered the state of the agent based on agent integrity verification [6]. A known drawback of such method is that i...

متن کامل

Performance Analysis in Secured Grid Resource Selection based on Trust and Reputation

Grid computing is the robust technology which is used to utilize the idle or available resources very effectively is solving the large scale or scientific problems. The security is a major concern in selecting a high degree of strange resources available. In this paper we have compared our proposed approach with the previous approach and the experimental analysis have proved that the proposed a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Scalable Computing: Practice and Experience

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2010