Skip to main content

Compromised Resources Tolerance in Grid Computing Systems

  • Conference paper
Intelligent Distributed Computing IV

Part of the book series: Studies in Computational Intelligence ((SCI,volume 315))

Abstract

In the past ten years, grid computing has been heavily researched and developed. At the present, grid technology has matured enough to enable the realization of workable and commercial infrastructures, platforms and tools, ready to be used in production environments ranging from scientific to commercial application domains. As grid resources are used outside of organizational boundaries, it becomes increasingly difficult to guarantee that a resource being used is not malicious in some way. However, the critical grid application domains require many protections against malicious entities or massive attacks. It is then necessary to detect and tolerate malicious behavior of grid resources (or resources provider) in order to enhance the efficiency of grid security architecture. In this paper, we will propose and discuss an attack-tolerance mechanism based on sabotage tolerance technique. The grid broker service will build the reputation of all resources provider, by observing their trustworthiness from their previous results. The reputation value can be used in the validation process of job result by using majority voting technique.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Berman, F., Fox, G.C., Hey, A.J.G.: Grid Computing: Making the Global Infrastructure a Reality. Wiley, Chichester (2003)

    Google Scholar 

  2. David, P.A.B.: Boinc: A system for public-resource computing and storage. In: GRID 2004: The Fifth IEEE/ACM International Workshop on Grid Computing, pp. 4–10. IEEE Computer Society, Washington (2004)

    Google Scholar 

  3. Demchenko, Y., Gommans, L., de Laat, C., Oudenaarde, B.: Web services and grid security vulnerabilities and threats analysis and model. In: GRID 2005: The 6th IEEE/ACM International Workshop on Grid Computing, pp. 262–267. IEEE Computer Society, Washington (2005)

    Chapter  Google Scholar 

  4. Domingues, P., Sousa, B., Silva, L.M.: Sabotage-tolerance and trust management in Desktop Grid computing. Future Generation Computer System 23(7), 904–912 (2007)

    Article  Google Scholar 

  5. Ermisch, J., Gambetta, D.: People’s trust: The design of a survey-based experiment. IZA Discussion Papers 2216, Institute for the Study of Labor (2006)

    Google Scholar 

  6. Farag, A., Muthucumaru, M.: Towards Trust-Aware Resource Management in Grid Computing Systems. In: CCGRID 2002: 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID 2002), p. 452. IEEE Computer Society, Washington (2002)

    Google Scholar 

  7. Galli,P.: DoS attack brings down Sun Grid demo, http://www.eweek.com/article2/0,1895,1941574,00.asp.CitedMars2006

  8. Commercial grid solutions. Grid Computing Planet, http://www.gridcomputingplanet.com/resources/article.php/933781.Cited18December2006

  9. Jiancheng, N., Zhishu, L., Zhonghe, G., Jirong, S.: Threat analysis and Prevention for grid and web security services. In: Proc. of Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, pp. 526–531 (2007)

    Google Scholar 

  10. Kondo, D., Araujo, F., Malecot, P., Domingues, P., Silva, L.M., Fedak, G., Cappello, F.: Characterizing result errors in Internet Desktop Grids. In: Kermarrec, A.-M., Bougé, L., Priol, T. (eds.) Euro-Par 2007. LNCS, vol. 4641, pp. 361–371. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  11. Monrose, F., Wyckoff, P., Rubin, A.D.: Distributed execution with remote audit. In: The Network and Distributed System Security Symposium, NDSS. The Internet Society, San Diego (1999)

    Google Scholar 

  12. Oliveira, A.C., Sampaio, L., Fernandes, S.F., Brasileiro, F.: Adaptive Sabotage-Tolerant Scheduling for Peer-to-Peer Grids. In: LADC 2009: 2009 Fourth Latin-American Symposium on Dependable Computing (LADC 2009), pp. 25–32. IEEE Computer Society, Joao Pessoa (2009)

    Chapter  Google Scholar 

  13. Sarmenta, L.F.G.: Sabotage-tolerance mechanisms for volunteer computing systems. Future Generation Computer Systems 18(4), 561–572 (2002)

    Article  MATH  Google Scholar 

  14. Wenliang, D., Jing, J., Mangal, M., Murugesan, M.: Uncheatable grid computing. In: ICDCS 2004: The 24th International Conference on Distributed Computing Systems (ICDCS 2004), pp. 4–11. IEEE Computer Society, Washington (2004)

    Chapter  Google Scholar 

  15. Yang, E.Y., Matthews, B., Lakhani, A., Jégou, Y.: Virtual organization management in XtreemOS: an overview. In: Towards Next Generation Grids, Proc. of the CoreGRID Symposium, Rennes, France, Springer, Heidelberg (2007)

    Google Scholar 

  16. Zhao, S., Lo, V., GauthierDickey, C.: Result verification and trust-based scheduling in peer-to-peer grids. In: P2P 2005: The 5th IEEE International Conference on Peer-to-Peer Computing (P2P 2005), pp. 31–38. IEEE Computer Society, Washington (2005)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bendahmane, A., Essaaidi, M., El Moussaoui, A., Younes, A. (2010). Compromised Resources Tolerance in Grid Computing Systems. In: Essaaidi, M., Malgeri, M., Badica, C. (eds) Intelligent Distributed Computing IV. Studies in Computational Intelligence, vol 315. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15211-5_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15211-5_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15210-8

  • Online ISBN: 978-3-642-15211-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics