Enhancing grid security with trust management

Recently, trust has been recognized as an important factor for grid computing security. We develop a trust management architecture for trust enhanced grid security incorporating a novel trust model which is capable of capturing various types of trust relationships that exist in a grid system and providing mechanisms for trust evaluation, recommendations and update for trust decisions. The outcomes of the trust decisions can then be employed by the grid security system to formulate trust enhanced security solutions. We design several algorithms to demonstrate how one can derive the trust enhanced security solutions for both user and resource provider protection with the proposed trust management architecture. Leveraging on trust knowledge and forming it as part of the security decisions, the proposed architecture possesses several desirable emerging properties that enable it to provide an improved level of security for grid computing systems.

[1]  Xiaoqi Li,et al.  A trust model based routing protocol for secure ad hoc networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).

[2]  S Hailes,et al.  Using Recommendations for Managing Trust in Distributed Systems , 1997 .

[3]  Ruby B. Lee,et al.  Scoping security issues for interactive grids , 2003, The Thrity-Seventh Asilomar Conference on Signals, Systems & Computers, 2003.

[4]  Matt Bishop,et al.  What Is Computer Security? , 2003, IEEE Secur. Priv..

[5]  Marty Humphrey,et al.  Security Implications of Typical Grid Computing Usage Scenarios , 2001, Proceedings 10th IEEE International Symposium on High Performance Distributed Computing.

[6]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[7]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[8]  Shanshan Song,et al.  Fuzzy Trust Integration for Security Enforcement in Grid Computing , 2004, NPC.

[9]  Ian T. Foster,et al.  The anatomy of the grid: enabling scalable virtual organizations , 2001, Proceedings First IEEE/ACM International Symposium on Cluster Computing and the Grid.

[10]  Ian T. Foster,et al.  A security architecture for computational grids , 1998, CCS '98.

[11]  Ben Y. Zhao,et al.  An architecture for a secure service discovery service , 1999, MobiCom.

[12]  Li Gong,et al.  A secure identity-based capability system , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[13]  Muthucumaru Maheswaran,et al.  Evolving and managing trust in grid computing systems , 2002, IEEE CCECE2002. Canadian Conference on Electrical and Computer Engineering. Conference Proceedings (Cat. No.02CH37373).

[14]  David M. Chess,et al.  Security Issues in Mobile Code Systems , 1998, Mobile Agents and Security.

[15]  Yi Mu,et al.  On the Design of a New Trust Model for Mobile Agent Security , 2004, TrustBus.

[16]  Renato J. O. Figueiredo,et al.  Fine-grain access control for securing shared resources in computational grids , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.

[17]  Mary R. Thompson,et al.  CA-based Trust Model for Grid Authentication and Identity Delegation , 2002 .

[18]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[19]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[20]  Dieter Gollmann,et al.  Computer Security , 1979, Lecture Notes in Computer Science.