We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Survey on Trust Aware Security and Scheduling in Traditional and Ad Hoc Grids

by Slavomír Kavecký, Penka Martincová
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 133 - Number 12
Year of Publication: 2016
Authors: Slavomír Kavecký, Penka Martincová
10.5120/ijca2016908058

Slavomír Kavecký, Penka Martincová . A Survey on Trust Aware Security and Scheduling in Traditional and Ad Hoc Grids. International Journal of Computer Applications. 133, 12 ( January 2016), 1-13. DOI=10.5120/ijca2016908058

@article{ 10.5120/ijca2016908058,
author = { Slavomír Kavecký, Penka Martincová },
title = { A Survey on Trust Aware Security and Scheduling in Traditional and Ad Hoc Grids },
journal = { International Journal of Computer Applications },
issue_date = { January 2016 },
volume = { 133 },
number = { 12 },
month = { January },
year = { 2016 },
issn = { 0975-8887 },
pages = { 1-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume133/number12/23835-2016908058/ },
doi = { 10.5120/ijca2016908058 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:30:57.413863+05:30
%A Slavomír Kavecký
%A Penka Martincová
%T A Survey on Trust Aware Security and Scheduling in Traditional and Ad Hoc Grids
%J International Journal of Computer Applications
%@ 0975-8887
%V 133
%N 12
%P 1-13
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The grid infrastructure has emerged as a technology supporting long-term collaboration utilizing shared resources spread across multiple administrative domains. However, for a transient community that is interested only in short-term or one-time collaborations the establishment of a traditional grid environment can become too cumbersome. The ad hoc grid infrastructure was proposed as a consequence of the need for the short-term collaborations. The ad hoc grid infrastructure provides the same basic grid services as the traditional grid, but the implementation of these services may vary from the implementation in the traditional grid. The paper focuses mainly on the similarities and differences in the trust awareness of grid security and job scheduling in the traditional and ad hoc grid environments.

References
  1. Akenti, 2015.
  2. Roberto Alfieri, Roberto Cecchini, Vincenzo Ciaschini, Luca dell’Agnello, Alberto Gianoli, Fabio Spataro, Franck Bonnassieux, Philippa J. Broadfoot, Gavin Lowe, Linda Cornwall, Jens Jensen, David P. Kelsey, A´ kos Frohner, David L. Groep, Wim Som de Cerff, Martijn Steenbakkers, Gerben Venekamp, Daniel Kouril, Andrew McNab, Olle Mulmo, Mika Silander, Joni Hahkala, and K´aroly L¨orentey. Managing dynamic user communities in a grid of autonomous resources. CoRR, cs.DC/0306004, 2003.
  3. Kaizar Amin, Gregor von Laszewski, and Armin R. Mikler. Toward an architecture for ad hoc grids. In 12th International Conference on Advanced Computing and Communications (ADCOM 2004), Ahmedabad, pages 15–18, 2004.
  4. Nazareno Andrade, Lauro Costa, Guilherme Germ´oglio, and Walfredo Cirne. Peer-to-peer grid computing with the ourgrid community. In 23rd Brazilian Symposium on Computer Networks (SBRC 2005) - 4th Special Tools Session, 2005.
  5. F. Azzedin and M. Maheswaran. Evolving and managing trust in grid computing systems. In Canadian Conference on Electrical and Computer Engineering, IEEE CCECE 2002, volume 3, pages 1424–1429, 2002.
  6. David W. Chadwick, Alexander Otenko, and Edward Ball. Role-based access control with x.509 attribute certificates. IEEE Internet Computing, 7(2):62–69, March 2003.
  7. Changsong Ding, Yi Fu, Zhigang Hu, and Peng Xiao. A novel trust model based on bayesian network for service-oriented grid. In ACIS-ICIS, pages 494–499. IEEE Computer Society, 2009.
  8. Luciana dos S. Lima, Antˆonio T. A. Gomes, Artur Ziviani, Markus Endler, Luiz F. G. Soares, and Bruno Schulze. Peerto- peer resource discovery in mobile grids. In Proceedings of the 3rd InternationalWorkshop on Middleware for Grid Computing, MGC ’05, pages 1–6. ACM, 2005.
  9. Colin English, Sotirios Terzis, and Waleed Wagealla. Engineering trust based collaborations in a global computing environment. In iTrust, volume 2995 of Lecture Notes in Computer Science, pages 120–134, 2004.
  10. I. Foster, H. Kishimoto, A. Savva, D. Berry, A. Djaoui, A. Grimshaw, B. Horn, F. Maciel, F. Siebenlist, R. Subramaniam, J. Treadwell, and J. Von Reich. The open grid services architecture, version 1.5, July 2006.
  11. Ian Foster, Carl Kesselman, and Steven Tuecke. The anatomy of the grid: Enabling scalable virtual organizations. International Journal of High Performance Computing Applications, 15(3):200–222, August 2001.
  12. Michael R. Garey and David S. Johnson. Computers and Intractability; A Guide to the Theory of NP-Completeness. W. H. Freeman & Co., New York, NY, USA, 1990.
  13. Gridbus, 2015.
  14. Antˆonio Tadeu A. Gomes, Artur Ziviani, Luciana dos S. Lima, and Markus Endler. Performance evaluation of a discovery and scheduling protocol for multihop ad hoc mobile grids. Journal of the Brazilian Computer Society, 15(4):15– 29, 2009.
  15. Christian Grimme, Joachim Lepping, Alexander Papaspyrou, Philipp Wieder, Ramin Yahyapour, Ariel Oleksiak, Oliver W¨aldrich, and Wolfgang Ziegler. Towards a standards-based grid scheduling architecture. In Grid Computing, pages 147– 158. Springer US, 2008.
  16. Globus toolkit, 2015.
  17. K.A. Hummel and G. Jelleschitz. A robust decentralized job scheduling approach for mobile peers in ad-hoc grids. In Seventh IEEE International Symposium on Cluster Computing and the Grid, 2007. CCGRID 2007., pages 461–470, May 2007.
  18. Wei Jie, Junaid Arshad, Richard Sinnott, Paul Townend, and Zhou Lei. A review of grid authentication and authorization technologies and support for federated access control. ACM Computing Surveys, 43(2):12:1–12:26, February 2011.
  19. Audun Jøsang, Roslan Ismail, and Colin Boyd. A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2):618–644, mar 2007.
  20. Audun Jøsang, Claudia Keser, and Theo Dimitrakos. Can we manage trust? In Trust Management, volume 3477 of Lecture Notes in Computer Science, pages 93–107, 2005.
  21. R. Kashyap and D. P. Vidyarthi. Dual objective security driven scheduling model for computational grid using ga. IAENG International Journal of Computer Science, 39(1):71– 79, 2012.
  22. D. Kaur and J. SenGupta. A trust model based on p2p trust models for secure global grids. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, pages 1103–1108, June 2012.
  23. Hongmei Liao, Qianping Wang, and Guoxin Li. A fuzzy logic-based trust model in grid. In Proceedings of the 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing - Volume 01, NSWCTC ’09, pages 608–614, 2009.
  24. Hongmei Liao, Qianping Wang, and Guoxin Li. A reliable fuzzy theory based reputation system in grid. Journal of Computers, 5(5):782–790, 2010.
  25. H. Morsy and H. El-Rewini. Adaptive scheduling in a mobile ad-hoc grid for time-sensitive computing. In 2013 ACS International Conference on Computer Systems and Applications (AICCSA), pages 1–8, May 2013.
  26. B. C. Neuman and T. Ts’o. Kerberos: An authentication service for computer networks. IEEE Communications Magazine, 32(9):33–38, September 1994.
  27. Openathens, 2015.
  28. R. Ranjan, A. Harwood, and R. Buyya. Peer-to-peer-based resource discovery in global grids: A tutorial. Communications Surveys and Tutorials, 10(2):6–33, April 2008.
  29. Tatyana Ryutov, Li Zhou, Clifford Neuman, Noria Foukia, Travis Leithead, and Kent E. Seamons. Adaptive trust negotiation and access control for grids. In GRID, pages 55–62. IEEE, 2005.
  30. Jennifer M. Schopf. Ten actions when grid scheduling: The user as a grid scheduler. In Grid Resource Management, pages 15–23, Norwell, MA, USA, 2004. Kluwer Academic Publishers.
  31. Jianqiang Shi, Gregor Bochmann, and Carlisle Adams. A trust model with statistical foundation. In Formal Aspects in Security and Trust, volume 173 of IFIP International Federation for Information Processing, pages 145–158. Springer US, 2005.
  32. Shanshan Song, Kai Hwang, and Yu-Kwong Kwok. Trusted grid computing with security binding and trust integration. Journal of Grid Computing, 3(1-2):53–73, 2005.
  33. Shanshan Song, Kai Hwang, and Mikin Macwan. Fuzzy trust integration for security enforcement in grid computing. In Network and Parallel Computing, volume 3222 of Lecture Notes in Computer Science, pages 9–21. Springer Berlin Heidelberg, 2004.
  34. P. Suresh Kumar and S. Ramachandram. User satisfaction based quantification of direct trust in t-grid computational model. In Computer, Communications, and Control Technology (I4CT), 2014 International Conference on, pages 438– 442, Sept 2014.
  35. Pablo G. S. Tiburcio and Marco Aur´elio Spohn. Ad hoc grid: An adaptive and self-organizing peer-to-peer computing grid. In IEEE 10th International Conference on Computer and Information Technology (CIT), pages 225–232. IEEE Computer Society, 2010.
  36. Uniform interface to computing resources, 2015.
  37. Zhi Wang, Qi Chen, and Chuanshan Gao. Implementing grid computing over mobile ad-hoc networks based on mobile agent. In Fifth International Conference on Grid and Cooperative Computing Workshops, 2006. GCCW ’06., pages 321– 326, Oct 2006.
  38. Joel Weise. Public key infrastructure overview, 2001.
  39. Yujiex Xu and Wenyu Qu. A trust model-based task scheduling algorithm for data-intensive application. In 2011 Sixth Annual Chinagrid Conference (ChinaGrid), pages 227–233, Aug 2011.
  40. R. Yahyapour and Ph. Wieder. Grid scheduling use cases, March 2006.
  41. Gao Ying and Zhan Jiang. A layered trust model based on behavior in service grid. In 2010 2nd International Conference on Advanced Computer Control (ICACC), volume 5, pages 511–515, March 2010.
  42. Shanyu Zhao, Virginia Lo, and Chris GauthierDickey. Result verification and trust-based scheduling in peer-to-peer grids. In Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing, P2P ’05, pages 31–38, Washington, DC, USA, 2005. IEEE Computer Society.
Index Terms

Computer Science
Information Sciences

Keywords

Traditional grid Ad hoc grid Trust aware grid security Trust aware job scheduling