Trust-GSM: A Trust Aware Security Model for Multi-domain Grid

Grid security is a major requirement in grid computing. Trust management is considered as an effective approach to enhance grid security. This paper introduces the trust into the multi-domain grid and qualifies grid trust as the relationship between grid resource providers and grid consumers. In order to provide more flexible and scalable protection for grid resources and services in multi-domain grid, this paper puts forward a novel trust model in multi-domain grid environment. As an application of our trust model, this trust model is originally introduced into grid security framework as an important component of security framework. By analyzing the case study, it is easy to see that our trust aware security model can meet the security requirement of multi-domain grid environment and has the characters of better security, scalability and flexibility.

[1]  Baoyi Wang,et al.  Research on a Fine-grained Access Control Mechanism for Cross-domain Grid , 2005, 2005 First International Conference on Semantics, Knowledge and Grid.

[2]  Elisa Bertino,et al.  Efficient integration of fine-grained access control in large-scale grid services , 2005, 2005 IEEE International Conference on Services Computing (SCC'05) Vol-1.

[3]  David F. Ferraiolo,et al.  Access Control Policy Combinations for the Grid Using the Policy Machine , 2007, Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid '07).

[4]  Yi Chen,et al.  A Fuzzy Trust Evaluation Based Access Control in Grid Environment , 2008, The Third ChinaGrid Annual Conference (chinagrid 2008).

[5]  Junzhou Luo,et al.  A Trust Aware Access Control in Service Oriented Grid Environment , 2007, Sixth International Conference on Grid and Cooperative Computing (GCC 2007).

[6]  Ian T. Foster,et al.  Grid Services for Distributed System Integration , 2002, Computer.

[7]  Hector Garcia-Molina,et al.  Taxonomy of trust: Categorizing P2P reputation systems , 2006, Comput. Networks.

[8]  Karl Aberer,et al.  P2P reputation management: Probabilistic estimation vs. social networks , 2006, Comput. Networks.

[9]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[10]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[11]  Li Jing,et al.  GADAM: An Authorization Model Based on Attribute Delegation in Grid , 2008, 2008 Workshop on Power Electronics and Intelligent Transportation System.

[12]  Jan H. P. Eloff,et al.  A Trust and Context Aware Access Control Model for Web Services Conversations , 2007, TrustBus.

[13]  Jerry den Hartog,et al.  Nonmonotonic Trust Management for P2P Applications , 2005, STM.

[14]  Ian T. Foster,et al.  A Flexible Attribute Based Access Control Method for Grid Computing , 2008, Journal of Grid Computing.

[15]  Junzhou Luo,et al.  A trust degree based access control in grid environments , 2009, Inf. Sci..

[16]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[17]  Lu Jian,et al.  A Trust Measurement and Evolution Model for Internetware , 2006 .

[18]  Akbar Ghaffarpour Rahbar,et al.  PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.