Security Aspects in Resource Management Systems in Distributed Computing Environments

Abstract In many distributed computing systems, aspects related to security are getting more and more relevant. Security is ubiquitous and could not be treated as a separated problem or a challenge. In our opinion it should be considered in the context of resource management in distributed computing environments like Grids and Clouds, e.g. scheduled computations can be much delayed because of cyber-attacks, inefficient infrastructure or users valuable and sensitive data can be stolen even in the process of correct computation. To prevent such cases there is a need to introduce new evaluation metrics for resource management that will represent the level of security of computing resources and more broadly distributed computing infrastructures. In our approach, we have introduced a new metric called reputation, which simply determines the level of reliability of computing resources from the security perspective and could be taken into account during scheduling procedures. The new reputation metric is based on various relevant parameters regarding cyber-attacks (also energy attacks), administrative activities such as security updates, bug fixes and security patches. Moreover, we have conducted various computational experiments within the Grid Scheduling Simulator environment (GSSIM) inspired by real application scenarios. Finally, our experimental studies of new resource management approaches taking into account critical security aspects are also discussed in this paper.

[1]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[2]  Abhishek Chandra,et al.  Adaptive Reputation-Based Scheduling on Unreliable Distributed Infrastructures , 2007, IEEE Transactions on Parallel and Distributed Systems.

[3]  Jarek Nabrzyski,et al.  Security and performance enhancements to OGSA‐DAI for Grid data virtualization , 2007, Concurr. Comput. Pract. Exp..

[4]  Ernesto Damiani,et al.  A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.

[5]  Karl Aberer,et al.  Managing trust in a peer-2-peer information system , 2001, CIKM '01.

[6]  Abhishek Chandra,et al.  Reputation-Based Scheduling on Unreliable Distributed Infrastructures , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[7]  Zhenyu Wu,et al.  Energy Attack on Server Systems , 2011, WOOT.

[8]  Paul Resnick,et al.  Reputation systems , 2000, CACM.

[9]  Xiaorui Wang,et al.  Power Attack: An Increasing Threat to Data Centers , 2014, NDSS.

[10]  Ariel Oleksiak,et al.  GSSIM --A tool for distributed computing experiments , 2011 .

[11]  Zhenyu Wu,et al.  On Energy Security of Server Systems , 2012, IEEE Transactions on Dependable and Secure Computing.

[12]  Akbar Ghaffarpour Rahbar,et al.  PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.