Skip to main content

A Novel Approach for Building a Dynamically Reconfigurable Trustworthy Distributed System

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 70))

Abstract

Trust management systems are the robust architectural frameworks for allowing authorization to resources of a distributed computing environment that could be cluster and grid based extendible to peer to peer paradigm. A policy driven methodology is adopted in cluster based architecture in order to provide control to remotely accessible resources. The interaction between nodes and resource allocation with trustworthiness dimensions is a central challenge in building a trustworthy distributed system. By imposing authentication procedure in a cluster, nodes can grant access to their critical resources to each other thus forming a trusted relationship. This work addresses the crucial issue of forming a trusted cluster of distributed entities in order to facilitate resource sharing and load balancing. Experimental results show that the communication cost of establishing trust among entities in terms of number of message exchange by our approach is reduced by 11–18% with comparable memory consumption.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sun, Y., Han, Z., Ray Liu, K.J.: Defense of Trust Management Vulnerabilities in Distributed Networks. IEEE Communications Magazine, Feature Topic on Security in Mobile Ad Hoc and Sensor Networks 46(2), 112–119 (2008)

    Google Scholar 

  2. Chapin, P.C., Christian, S., Wang, X.S.: Authorization in Trust Management: Features and Foundations. ACM Computing Surveys 40(3) (2008)

    Google Scholar 

  3. Yu, Z.: Decentralized Trust Management based on the Reputation of Information Sources. In: The Proceedings of 2007 IEEE International Conference on Networking, Sensing and Control, London (2007)

    Google Scholar 

  4. Sun, Y.L., et al.: A Trust Evaluation framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks. In: The Proceedings of 25th IEEE International Conference on Computer Communication: INFOCOM (2006)

    Google Scholar 

  5. Wu, Y., et al.: Automatically Constructing Trusted Cluster Computing Environment. The Journal of Supercomputing (July 2009)

    Google Scholar 

  6. Zou, D., et al.: Building an Automated Trust Negotiation Architecture in Virtual Computing Environment. The Journal of Supercomputing (2009)

    Google Scholar 

  7. Sirbu, M.A., Chuang, J.C.-I.: Distributed Authentication in Kerberos using Public Key Cryptography. In: Symposium on Network and Distributed System Security, p. 134 (1997)

    Google Scholar 

  8. Skakun, S., Kussul, N.: An Agent Approach for providing Security in Distributed Systems: TCSET (2006)

    Google Scholar 

  9. Mishra, S., Kushwaha, D.S., Misra, A.K.: Jingle-Mingle: A Hybrid Reliable load Balancing approach for Load Balancing in a Trusted Distributed Environment. In: IEEE Proceedings of 5th International Joint Conference on INC, IMS & IDC, NCM 2009, pp. 117–122 (2009)

    Google Scholar 

  10. Mishra, S., Kushwaha, D.S., Misra, A.K.: A Cooperative Trust Management framework for Load Balancing in Cluster based Distributed System. In: IEEE International Conference on Recent Trends in Telecommunication, Information and Computing (accepted, 2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mishra, S., Kushwaha, D.S., Misra, A.K. (2010). A Novel Approach for Building a Dynamically Reconfigurable Trustworthy Distributed System. In: Das, V.V., et al. Information Processing and Management. BAIP 2010. Communications in Computer and Information Science, vol 70. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12214-9_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12214-9_42

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12213-2

  • Online ISBN: 978-3-642-12214-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics