We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Overview of Trust Models Integrating Trust Management into Grid Computing

by Slavom´ır Kaveck´, Penka Martincov´
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 129 - Number 7
Year of Publication: 2015
Authors: Slavom´ır Kaveck´, Penka Martincov´
10.5120/ijca2015906657

Slavom´ır Kaveck´, Penka Martincov´ . Overview of Trust Models Integrating Trust Management into Grid Computing. International Journal of Computer Applications. 129, 7 ( November 2015), 1-6. DOI=10.5120/ijca2015906657

@article{ 10.5120/ijca2015906657,
author = { Slavom´ır Kaveck´, Penka Martincov´ },
title = { Overview of Trust Models Integrating Trust Management into Grid Computing },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 129 },
number = { 7 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume129/number7/23082-2015906657/ },
doi = { 10.5120/ijca2015906657 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:22:45.551787+05:30
%A Slavom´ır Kaveck´
%A Penka Martincov´
%T Overview of Trust Models Integrating Trust Management into Grid Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 129
%N 7
%P 1-6
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The collaborations in open environments are necessarily coupled with potential dangers. Recently, in the grid computing the trust management has been recognized as a mechanism for managing the dangers and learning from past interactions. In the last few years several trust models were proposed. The models incorporate trust into the process of decision making whether or not to collaborate through a grid environment. However, the accuracy of the made decisions is dependent on a correct assessment and representation of trustworthiness assigned to the collaborating parties. The paper overviews several trust models, specify their characteristic attributes and describe the models according to the specified attributes. The overview enables a better understanding of trust management integration into the grid computing. It also defines essential features of the trust models that should be considered during the design of future models.

References
  1. F. Azzedin and M. Maheswaran. Evolving and managing trust in grid computing systems. In Canadian Conference on Electrical and Computer Engineering, 2002., volume 3, pages 1424–1429, 2002.
  2. Michael Brinklov and Robin Sharp. Incremental trust in grid computing. In Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid, CCGRID ’07, pages 135–144, 2007.
  3. Changsong Ding, Yi Fu, Zhigang Hu, and Peng Xiao. A novel trust model based on bayesian network for service-oriented grid. In Eighth IEEE/ACIS International Conference on Computer and Information Science, 2009., pages 494–499, June 2009.
  4. Colin English, Sotirios Terzis, and Waleed Wagealla. Engineering trust based collaborations in a global computing environment. In Trust Management, volume 2995 of Lecture Notes in Computer Science, pages 120–134, 2004.
  5. Wei Jie, Junaid Arshad, and Pascal Ekin. Authentication and authorization infrastructure for grids—issues, technologies, trends and experiences. The Journal of Supercomputing, 52(1):82–96, 2010.
  6. Wei Jie, Junaid Arshad, Richard Sinnott, Paul Townend, and Zhou Lei. A review of grid authentication and authorization technologies and support for federated access control. ACM Computing Surveys, 43(2):12:1–12:26, February 2011.
  7. Audun Jøsang, Roslan Ismail, and Colin Boyd. A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2):618–644, mar 2007.
  8. Audun Jøsang, Claudia Keser, and Theo Dimitrakos. Can we manage trust? In Trust Management, volume 3477 of Lecture Notes in Computer Science, pages 93–107. Springer Berlin Heidelberg, 2005.
  9. D. Kaur and J. SenGupta. A trust model based on p2p trust models for secure global grids. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, pages 1103–1108, June 2012.
  10. G. Kavitha and V. Sankaranarayanan. Secure resource selection in computational grid based on quantitative execution trust. International Science Index, 4(12):112 – 118, 2010.
  11. Hongmei Liao, Qianping Wang, and Guoxin Li. A fuzzy logic-based trust model in grid. In Proceedings of the 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing - Volume 01, NSWCTC ’09, pages 608–614, 2009.
  12. Hongmei Liao, Qianping Wang, and Guoxin Li. A reliable fuzzy theory based reputation system in grid. Journal of Computers, 5(5):782–790, 2010.
  13. Ching Lin, Vijay Varadharajan, YanWang, and Vineet Pruthi. Enhancing grid security with trust management. In Proceedings of the 2004 IEEE International Conference on Services Computing, 2004., pages 303–310, Sept 2004.
  14. P.D. Manuel, S. Thamarai Selvi, and M.IA-E. Barr. Trust management system for grid and cloud resources. In First International Conference onAdvanced Computing, 2009., pages 176–181, Dec 2009.
  15. Elvis Papalilo and Bernd Freisleben. Managing behaviour trust in grid computing environments. Journal of Information Assurance and Security, 3:27–37, March 2008.
  16. Tatyana Ryutov, Li Zhou, Clifford Neuman, Noria Foukia, Travis Leithead, and Kent E. Seamons. Adaptive trust negotiation and access control for grids. In GRID, pages 55–62. IEEE, 2005.
  17. Jianqiang Shi, Gregor v. Bochmann, and Carlisle Adams. A trust model with statistical foundation. In Formal Aspects in Security and Trust, volume 173 of IFIP International Federation for Information Processing, pages 145–158. Springer US, 2005.
  18. Shanshan Song, Kai Hwang, and Yu-Kwong Kwok. Trusted grid computing with security binding and trust integration. Journal of Grid Computing, 3(1-2):53–73, 2005.
  19. Shanshan Song, Kai Hwang, and Mikin Macwan. Fuzzy trust integration for security enforcement in grid computing. In Network and Parallel Computing, volume 3222 of Lecture Notes in Computer Science, pages 9–21. Springer Berlin Heidelberg, 2004.
  20. P. Suresh Kumar and S. Ramachandram. User satisfaction based quantification of direct trust in t-grid computational model. In Computer, Communications, and Control Technology (I4CT), 2014 International Conference on, pages 438– 442, Sept 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Trust model overview trust management trust value modelling trust value structure