Reputation-based Majority Voting for Malicious Grid Resources Tolerance

Recently, distributed computing infrastructures such as grid computing, have witnessed huge developments which have a very important impact on computationally intensive scientific, industrial and engineering problems. Collaborative computing, resources access and sharing facilitated by grid computing systems amplifies concerns about cyber attacks and misbehaviors of grid resources (resources provider). In many cases, an organization may send out jobs for remote execution on untrustworthy machines. Since resource sharing and cooperation among different administrative domains are among the central goals of grid computing, it is necessary to guarantee that, among the shared resources, there are no malicious resources interested in invalidating or corrupting the job results. In order to guarantee reliable jobs execution in grid systems, we have developed a new approach for malicious grid resources tolerance using reputation to improve the efficiency of majority voting mechanisms. The grid broker service investigates the trustworthiness of the grid resources used in the voting procedure; this investigation is based on distributed and hierarchical reputation management system which maintains a reputation value for each grid resource based on its historical behavior. The validation of the result is then decided based on the grid resources reputation level.

[1]  Muthucumaru Maheswaran,et al.  Integrating trust into grid resource management systems , 2002, Proceedings International Conference on Parallel Processing.

[2]  Proceedings 12th IEEE International Symposium on High Performance Distributed Computing , 2003, High Performance Distributed Computing, 2003. Proceedings. 12th IEEE International Symposium on.

[3]  Fabio Kon,et al.  InteGrade: object‐oriented Grid middleware leveraging the idle computing power of desktop machines , 2004, Concurr. Pract. Exp..

[4]  David P. Anderson,et al.  BOINC: a system for public-resource computing and storage , 2004, Fifth IEEE/ACM International Workshop on Grid Computing.

[5]  Rajkumar Buyya,et al.  GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids , 2004, PDCAT.

[6]  Paul Resnick,et al.  Reputation systems , 2000, CACM.

[7]  A. Bendahmane,et al.  Grid computing security mechanisms: State-of-the-art , 2009, 2009 International Conference on Multimedia Computing and Systems.

[8]  Carsten Franke,et al.  Virtual Organization Management in XtreemOS: an Overview , 2007, CoreGRID.

[9]  Wenliang Du,et al.  Uncheatable grid computing , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..

[10]  Francisco Vilar Brasileiro,et al.  Adaptive Sabotage-Tolerant Scheduling for Peer-to-Peer Grids , 2009, 2009 Fourth Latin-American Symposium on Dependable Computing.

[11]  Fabian Monrose,et al.  Distributed Execution with Remote Audit , 1999, NDSS.

[12]  Hector Garcia-Molina,et al.  EigenRep: Reputation Management in P2P Networks , 2003 .

[13]  Leon Gommans,et al.  Web services and grid security vulnerabilities and threats analysis and model , 2005, The 6th IEEE/ACM International Workshop on Grid Computing, 2005..

[14]  Muthucumaru Maheswaran,et al.  Towards Trust-Aware Resource Management in Grid Computing Systems , 2002, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02).

[15]  Ian T. Foster,et al.  A secure communications infrastructure for high-performance distributed computing , 1997, Proceedings. The Sixth IEEE International Symposium on High Performance Distributed Computing (Cat. No.97TB100183).

[16]  Ian T. Foster,et al.  A security architecture for computational grids , 1998, CCS '98.

[17]  Francine Berman,et al.  Overview of the Book: Grid Computing – Making the Global Infrastructure a Reality , 2003 .

[18]  Chris GauthierDickey,et al.  Result verification and trust-based scheduling in peer-to-peer grids , 2005, Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05).

[19]  Mohammed Essaaidi,et al.  Compromised Resources Tolerance in Grid Computing Systems , 2010, IDC.

[20]  Bruno Sousa,et al.  Sabotage-tolerance and trust management in desktop grid computing , 2007, Future Gener. Comput. Syst..

[21]  Luis F. G. Sarmenta,et al.  Sabotage-tolerance mechanisms for volunteer computing systems , 2001, Proceedings First IEEE/ACM International Symposium on Cluster Computing and the Grid.

[22]  Diego Gambetta,et al.  People's Trust: The Design of a Survey-Based Experiment , 2006, SSRN Electronic Journal.

[23]  Bernd Freisleben,et al.  Managing Behaviour Trust in Grid Computing Environments , 2008 .

[24]  Gilles Fedak,et al.  Characterizing Result Errors in Internet Desktop Grids , 2007, Euro-Par.

[25]  C. Chen,et al.  An approach for resource selection and allocation in grid based on trust management system , 2009, 2009 First International Conference on Future Information Networks.

[26]  V. Vijayakumar,et al.  Trust and Reputation Aware Security for Resource Selection in Grid Computing , 2008, 2008 International Conference on Security Technology.