Assessing security threat scenarios for utility-based reputation model in grids

Trust and reputation models play an important role in enabling trusted computations over large-scale distributed grids. Many models have been recently proposed and implemented within trust management systems. Nevertheless, the existing approaches usually assess performance of models in terms of resource management while less attention is paid to the analysis of security threat scenarios for such models. In this paper, we assess the most important and critical security threats for a utility-based reputation model in grids. The existing model is extended to address these threat scenarios. With simulations that were run using data collected from the EGEE Grid-Observatory project, we analyse efficiency of the utility-based reputation model against these threats.

[1]  Simon Haykin,et al.  Neural Networks: A Comprehensive Foundation , 1998 .

[2]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[3]  Ian T. Foster,et al.  The Anatomy of the Grid: Enabling Scalable Virtual Organizations , 2001, Int. J. High Perform. Comput. Appl..

[4]  Stefan Schmid,et al.  Distributed asymmetric verification in computational grids , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.

[5]  Emmanouel A. Varvarigos,et al.  Developing Scheduling Policies in gLite Middleware , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.

[6]  Michèle Sebag,et al.  The Grid Observatory , 2011, 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.

[7]  Abderrahim Sekkaki,et al.  Intrusion Detection for Computational Grids , 2008, 2008 New Technologies, Mobility and Security.

[8]  Félix Gómez Mármol,et al.  Providing trust in wireless sensor networks using a bio-inspired technique , 2011, Telecommun. Syst..

[9]  Chao-Chin Wu,et al.  An integrated security-aware job scheduling strategy for large-scale computational grids , 2010, Future Gener. Comput. Syst..

[10]  Nataliya N. Kussul,et al.  Implementation of the Neural Network Model of Users of Computer Systems on the Basis of Agent Technology , 2005 .

[11]  Shanshan Song,et al.  Trusted Grid Computing with Security Binding and Trust Integration , 2005, Journal of Grid Computing.

[12]  J. Nazuno Haykin, Simon. Neural networks: A comprehensive foundation, Prentice Hall, Inc. Segunda Edición, 1999 , 2000 .

[13]  Félix Gómez Mármol,et al.  Security threats scenarios in trust and reputation models for distributed systems , 2009, Comput. Secur..

[14]  Philip Robinson,et al.  PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation , 2006, iTrust.

[15]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[16]  Ming Gu,et al.  Anomaly Detection in Grid Computing Based on Vector Quantization , 2004, GCC.

[17]  A. N. Voronin A multicriteria problem of distribution of bounded resources , 2011 .

[18]  Muthucumaru Maheswaran,et al.  Integrating trust into grid resource management systems , 2002, Proceedings International Conference on Parallel Processing.

[19]  Anirban Chakrabarti Grid computing security , 2007 .

[20]  Manuel Blum,et al.  reCAPTCHA: Human-Based Character Recognition via Web Security Measures , 2008, Science.

[21]  Álvaro Enrique Arenas,et al.  Reputation management in collaborative computing systems , 2010, Secur. Commun. Networks.

[22]  Weisong Shi,et al.  A reputation-driven scheduler for autonomic and sustainable resource sharing in Grid computing , 2010, J. Parallel Distributed Comput..

[23]  Uwe Schwiegelshohn,et al.  Job Allocation Strategies with User Run Time Estimates for Online Scheduling in Hierarchical Grids , 2011, Journal of Grid Computing.

[24]  Nataliia Kussul,et al.  Grid Technologies for Satellite Data Processing and Management Within International Disaster Monitoring Projects , 2011, Grid and Cloud Database Management.

[25]  Won Suk Lee,et al.  An anomaly intrusion detection method by clustering normal user behavior , 2003, Comput. Secur..

[26]  Carla Merkle Westphall,et al.  Intrusion Detection for Grid and Cloud Computing , 2010, IT Professional.

[27]  Michèle Sebag,et al.  The Grid Observatory , 2011, CCGRID.

[28]  N. Kussul,et al.  Neural network approach for user activity monitoring in computer networks , 2004, 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541).

[29]  George D. Stamoulis,et al.  Reputation-Based Estimation of Individual Performance in Grids , 2008, 2008 Eighth IEEE International Symposium on Cluster Computing and the Grid (CCGRID).

[30]  Álvaro Enrique Arenas,et al.  A Utility-Based Reputation Model for Service-Oriented Computing , 2007, CoreGRID.

[31]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[32]  Mudhakar Srivatsa,et al.  Securing decentralized reputation management using TrustGuard , 2006, J. Parallel Distributed Comput..

[33]  Ladislav Hluchý,et al.  The Data Fusion Grid Infrastructure: Project Objectives and Achievements , 2010, Comput. Informatics.

[34]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[35]  Torsten Eymann,et al.  A Framework for Trust and Reputation in Grid Environments , 2008, Journal of Grid Computing.

[36]  Álvaro Enrique Arenas,et al.  Reputation Management in Grid-based Virtual Organisations , 2008, SECRYPT.

[37]  Nataliia Kussul,et al.  Grid computing technology for hydrological applications , 2011 .

[38]  Nataliia Kussul,et al.  Grid and sensor web technologies for environmental monitoring , 2009, Earth Sci. Informatics.