Abstract
In the past ten years, grid computing has been heavily researched and developed. At the present, grid technology has matured enough to enable the realization of workable and commercial infrastructures, platforms and tools, ready to be used in production environments ranging from scientific to commercial application domains. As grid resources are used outside of organizational boundaries, it becomes increasingly difficult to guarantee that a resource being used is not malicious in some way. However, the critical grid application domains require many protections against malicious entities or massive attacks. It is then necessary to detect and tolerate malicious behavior of grid resources (or resources provider) in order to enhance the efficiency of grid security architecture. In this paper, we will propose and discuss an attack-tolerance mechanism based on sabotage tolerance technique. The grid broker service will build the reputation of all resources provider, by observing their trustworthiness from their previous results. The reputation value can be used in the validation process of job result by using majority voting technique.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Berman, F., Fox, G.C., Hey, A.J.G.: Grid Computing: Making the Global Infrastructure a Reality. Wiley, Chichester (2003)
David, P.A.B.: Boinc: A system for public-resource computing and storage. In: GRID 2004: The Fifth IEEE/ACM International Workshop on Grid Computing, pp. 4–10. IEEE Computer Society, Washington (2004)
Demchenko, Y., Gommans, L., de Laat, C., Oudenaarde, B.: Web services and grid security vulnerabilities and threats analysis and model. In: GRID 2005: The 6th IEEE/ACM International Workshop on Grid Computing, pp. 262–267. IEEE Computer Society, Washington (2005)
Domingues, P., Sousa, B., Silva, L.M.: Sabotage-tolerance and trust management in Desktop Grid computing. Future Generation Computer System 23(7), 904–912 (2007)
Ermisch, J., Gambetta, D.: People’s trust: The design of a survey-based experiment. IZA Discussion Papers 2216, Institute for the Study of Labor (2006)
Farag, A., Muthucumaru, M.: Towards Trust-Aware Resource Management in Grid Computing Systems. In: CCGRID 2002: 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID 2002), p. 452. IEEE Computer Society, Washington (2002)
Galli,P.: DoS attack brings down Sun Grid demo, http://www.eweek.com/article2/0,1895,1941574,00.asp.CitedMars2006
Commercial grid solutions. Grid Computing Planet, http://www.gridcomputingplanet.com/resources/article.php/933781.Cited18December2006
Jiancheng, N., Zhishu, L., Zhonghe, G., Jirong, S.: Threat analysis and Prevention for grid and web security services. In: Proc. of Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, pp. 526–531 (2007)
Kondo, D., Araujo, F., Malecot, P., Domingues, P., Silva, L.M., Fedak, G., Cappello, F.: Characterizing result errors in Internet Desktop Grids. In: Kermarrec, A.-M., Bougé, L., Priol, T. (eds.) Euro-Par 2007. LNCS, vol. 4641, pp. 361–371. Springer, Heidelberg (2007)
Monrose, F., Wyckoff, P., Rubin, A.D.: Distributed execution with remote audit. In: The Network and Distributed System Security Symposium, NDSS. The Internet Society, San Diego (1999)
Oliveira, A.C., Sampaio, L., Fernandes, S.F., Brasileiro, F.: Adaptive Sabotage-Tolerant Scheduling for Peer-to-Peer Grids. In: LADC 2009: 2009 Fourth Latin-American Symposium on Dependable Computing (LADC 2009), pp. 25–32. IEEE Computer Society, Joao Pessoa (2009)
Sarmenta, L.F.G.: Sabotage-tolerance mechanisms for volunteer computing systems. Future Generation Computer Systems 18(4), 561–572 (2002)
Wenliang, D., Jing, J., Mangal, M., Murugesan, M.: Uncheatable grid computing. In: ICDCS 2004: The 24th International Conference on Distributed Computing Systems (ICDCS 2004), pp. 4–11. IEEE Computer Society, Washington (2004)
Yang, E.Y., Matthews, B., Lakhani, A., Jégou, Y.: Virtual organization management in XtreemOS: an overview. In: Towards Next Generation Grids, Proc. of the CoreGRID Symposium, Rennes, France, Springer, Heidelberg (2007)
Zhao, S., Lo, V., GauthierDickey, C.: Result verification and trust-based scheduling in peer-to-peer grids. In: P2P 2005: The 5th IEEE International Conference on Peer-to-Peer Computing (P2P 2005), pp. 31–38. IEEE Computer Society, Washington (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bendahmane, A., Essaaidi, M., El Moussaoui, A., Younes, A. (2010). Compromised Resources Tolerance in Grid Computing Systems. In: Essaaidi, M., Malgeri, M., Badica, C. (eds) Intelligent Distributed Computing IV. Studies in Computational Intelligence, vol 315. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15211-5_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-15211-5_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15210-8
Online ISBN: 978-3-642-15211-5
eBook Packages: EngineeringEngineering (R0)