Abstract
In the Grid computing model a remote service is provided by a resource owner to a client. The resource owner executes a client job and charges the client for a corresponding fee. In this paper we discuss the main weakness of many existing models for performing such a kind of transaction, i.e., the strong assumption that both the resource owner and the clients are honest. Then, we propose a new security model in which either the resource owners or the clients (or both) may not be honest. Our model introduces a trusted third party, referred to as “Grid Manager”. We describe in details the role of the Grid Manager and argue the advantages of our proposal with respect to the current state-of-the art.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Foster, I., Kesselman, C., Nick, J., Tuecke, S.: The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration. In: Open Grid Service Infrastructure WG, Global Grid Forum (2002)
Beardsmore, A.: Grid Service Accounting Extensions (GSAX), http://www.doc.ic.ac.uk/sjn5/GGF/ggf-rus-gsax-01.pdf
Grid Economic Services Architecture, GESA (2003), http://www.doc.ic.ac.uk/sjn5/GGF/draft-ggf-gesa-services-1.pdf
Hazlewood, V., Bean, R., Yoshimot, K.: SNUPI: A grid accounting and performance system employing portal services and RDBMS back-end. In: The 5th LCI International Conference on Linux Clusters: The HPC Revolution, pp. 18–20 (2004)
Barmouta, A., Buyya, R.: GridBank: A Grid Accounting Service Architecture (GASA) for Distribuited System Sharing and Integration. In: The 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), pp. 22–26 (2003)
Cowan, C., Wagle, P., Pu, C., Beattie, S., Walpole, J.: Overflows: Attacks and Defenses for the Vulnerability of the decade. In: DARPA Information Survivability Conference an Expo (DISCEX), vol. 2, pp. 119–129. IEEE Computer Society Press, Los Alamitos (2000)
Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations Among Notions of Security for Public-Key Encryption Schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26–45. Springer, Heidelberg (1998)
Fujisaki, E., Okamoto, T., Pointcheval, D., Stern, J.: Rsa-oaep is secure under the rsa assumption. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 260–274. Springer, Heidelberg (2001)
Bellare, M., Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: ACM Conference on Computer and Communications Security, pp. 62–73 (1993)
Housley, R., Ford, W., Polk, W., Solo, D.: Internet X509 Public Key Infrastructure: Certificate and CRL Profile. Network Working Group, RFC 3280 (2002)
Chen, W., Zheng, W.-M., Yang, G.-W.: On the Malicious Participants Problem in Computational Grid. In: Li, M., Sun, X.-H., Deng, Q.-n., Ni, J. (eds.) GCC 2003. LNCS, vol. 3032, pp. 839–848. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Catuogno, L., Faruolo, P., Petrillo, U.F., Visconti, I. (2004). Reliable Accounting in Grid Economic Transactions. In: Jin, H., Pan, Y., Xiao, N., Sun, J. (eds) Grid and Cooperative Computing - GCC 2004 Workshops. GCC 2004. Lecture Notes in Computer Science, vol 3252. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30207-0_64
Download citation
DOI: https://doi.org/10.1007/978-3-540-30207-0_64
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-23578-1
Online ISBN: 978-3-540-30207-0
eBook Packages: Springer Book Archive