Skip to main content

Fuzzy-Based Integration of Security and Trust in Distributed Computing

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 816))

Abstract

To protect the resources from various vulnerability factors, resources should have various routine security mechanisms such as antivirus capability, firewall capability, usage of secure network connections, provision of execution sandbox, invoking dynamic checkpointing, and intrusion detection system-related capabilities. Security is one of the key issues in distributed computing systems like grid and cloud. Whole system is secured when resources have self-defense capability. Adapting security measures in grid environment is an expensive mechanism and leads to delays in service provisioning whereas trust can be, relatively, a simple and fast solution. In view of the interest of the users and quick delivery of the services by the provider, integration of different combinations of trust levels and security mechanisms can reduce the costs and delays involved in adapting security measures. This paper proposes a new approach for integrating security levels along with trust in general for distributed computing systems and in particular for grid computing systems. Our previous work proposed a T-grid computational model suitable for grid computing systems, which will be used for experimenting and testing the proposed idea of the integration. Results of the studies are produced.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. IBM Red Book, G.: Fundamentals of Grid Computing, REDP-3613-00 (2004)

    Google Scholar 

  2. Foster, I., Kesselman, C.: The anatomy of the grid—enabling scalable virtual organizations. Int. J. Supercomput. Appl. (2002)

    Google Scholar 

  3. Merriam-Webster’s Collegiate Dictionary.: (2005)

    Google Scholar 

  4. Kavecky, S.: Grid security and trust management overview. Int. J. Comput. Sci. Issues 10(3), 225–233 (2013). (No. 2)

    Google Scholar 

  5. Suresh Kumar, P., Sateesh Kumar, P., Ramachandram, S.: Recent trust models in grid. Int. J. Theor. Appl. Inf. Technol. 26(1), 64–68 (2011)

    Google Scholar 

  6. Viduto, V., Townend, P., Xu, J., Djemame, K., Bochenkov, A.: A graph-based approach to address trust and reputation in ubiquitous networks. In: 2013 IEEE 7th International Symposium on Service Oriented System Engineering (SOSE), pp. 397, 402, 25–28 May 2013

    Google Scholar 

  7. Das, A., Islam, M.M.: SecuredTrust: a dynamic trust computation model for secured communication in multiagent systems. IEEE Trans. Dependable Secure Comput. 9(2), 261–274 (2012)

    Article  Google Scholar 

  8. Vijayakumar, V., Wahidha Banu, R.S.D.: Trust and reputation aware security for resource selection in grid computing. In: International Conference on Security Technology, pp. 121–124 (2008)

    Google Scholar 

  9. Song, S., Hwang, K., Kwok, Y.-K.: Trusted grid computing with security binding and trust integration. J. Grid Comput. (2005)

    Google Scholar 

  10. Patni, J.C., Rastogi, P., Jayant, V.K., Aswal, M.S.: Methods and mechanisms of security in grid computing. In: 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, pp. 1040–1043 (2015)

    Google Scholar 

  11. Kumar, G.M., Ramachandram, S., Gyani, J.: Randomized algorithm for trust model in grid computing using GridSim components. In: 2015 IEEE International Advance Computing Conference (IACC), Bangalore, pp. 936–941 (2015)

    Google Scholar 

  12. Ennahbaoui, M., Idrissi, H., Hajji, S.E.: Secure and flexible grid computing based intrusion detection system using mobile agents and cryptographic traces. In: 2015 11th International Conference on Innovations in Information Technology (IIT), Dubai, pp. 314–319 (2015)

    Google Scholar 

  13. Xu, Y., Qu, W.: A trust model-based task scheduling algorithm for data-intensive application. In: 2011 Sixth Annual Chinagrid Conference (ChinaGrid), pp. 227–233 (2011)

    Google Scholar 

  14. Noor, T.H., Sheng, Q.Z., Yao, L., Dustdar, S., Ngu, A.H.H.: CloudArmor: supporting reputation-based trust management for cloud services. IEEE Trans. Parallel Distrib. Syst. (2015)

    Google Scholar 

  15. Harbajanka, S., Saxena, P.: Survey paper on trust management and security issues in cloud computing. In: 2016 Symposium on Colossal Data Analysis and Networking (CDAN), Indore, pp. 1–3 (2016)

    Google Scholar 

  16. JaganRaja, V., Sathish Kumar, P., Venkatachalam, V.: Survey on trust management in distributed cloud environment. Int. J. Innov. Sci. Eng. Technol. 3(1) (2016)

    Google Scholar 

  17. Nalavade, U., Lomte, V.M.: Survey on various trust management issues in cloud environment. Int. J. Recent Innov. Trends Comput. Commun. 5(1), 15–18 (2017)

    Google Scholar 

  18. Suresh Kumar, P., Ramachandram, S.: User satisfaction based quantification of direct trust in T-grid computation model. In: Proceedings of IEEE International Conference on Computer, Communication and Control Technology (I4CT’2014), Langkawi, Kedah, Malaysia (2014)

    Google Scholar 

  19. Suresh Kumar, P., Ramachandram, S.: A study on impact of untrustworthy and older recommendations over T-grid computational model. Springer Int. J. Syst. Assur. Eng. Manag. (2014). Available Online

    Google Scholar 

  20. Liao, H., Wang, Q., Li, G.: A fuzzy logic-based trust model in grid. In: International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC ’09, vol. 1, pp. 608–614 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Suresh Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Suresh Kumar, P., Ramachandram, S. (2019). Fuzzy-Based Integration of Security and Trust in Distributed Computing. In: Bansal, J., Das, K., Nagar, A., Deep, K., Ojha, A. (eds) Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 816. Springer, Singapore. https://doi.org/10.1007/978-981-13-1592-3_72

Download citation

Publish with us

Policies and ethics