Academia.eduAcademia.edu

Outline

Evolving and managing trust in grid computing systems

2002, IEEE CCECE2002. Canadian Conference on Electrical and Computer Engineering. Conference Proceedings (Cat. No.02CH37373)

https://doi.org/10.1109/CCECE.2002.1012962

Abstract

A Grid computing system is a geographically distributed environment with autonomous domains that share resources amongst themselves. One primary goal of such a Grid environment is to encourage domain-to-domain interactions and increase the confidence of domains to use or share resources (a) without losing control over their own resources, and (b) ensuring confidentiality for others. To achieve this, the "trust" notion needs to be addressed so that trustworthiness makes such geographically distributed systems become more attractive and reliable for day-today use. In this paper, we view trust in two steps: (a) verifying the identity of an entity and what that identity is authorized to do, and (b) monitoring and managing the behavior of the entity and building a trust level based on that behavior. The identity trust has been the focus of many researchers, but unfortunately the behavior trust did not catch much attention. We present a formal definition of behavior trust and reputation and discuss a behavior trust management architecture that models the process of evolving and managing of behavior trust in Grid computing Systems.

References (14)

  1. A. Abdul-Rahman and S. Hailes, "Supporting trust in virtual communities," Hawaii Int'l Con- ference on System Sciences, 2000.
  2. C. Adams and S. Farral, "RFC2510 -Internet X.509 public key infrastructure certificate man- agement protocols," 1999.
  3. M. Blaze, J. Feigenbaum, and J. Lacy, "Decen- tralized trust management," IEEE Conference on Security and Privacy, 1996.
  4. M. Blaze, "Using the KeyNote trust management system," AT&T Research Labs, 1999.
  5. N. Damianou, N. Dulay, E. Lupu, and M. Slo- man, "The Ponder policy specification lan- guage," Workshop on Policies for Distributed Systems and Networks, 2001.
  6. I. Foster, C. Kesselman, and S. Tuecke, "The anatomy of the Grid: Enabling scalable virtual organizations," Int'l Journal on Supercomputer Applications, 2001.
  7. I. Foster and C. Kesselman (eds.), The Grid: Blueprint for a New Computing Infrastructure, Morgan Kaufmann, San Fransisco, CA, 1999.
  8. T. Grandison and M. Sloman, "A survey of trust in Internet applications," IEEE Communications Surveys & Tutorials, Vol. 3, No. 4, 2000.
  9. N. Habra, B. L. Chalier, A. Mounji, and I. Math- ieu, "ASAX: Software architecture and rule- based language for universal audit trail analysis," European Symposium on Research in Computer Security (ESORIC'92), 1992.
  10. S. A. Hofmeyr, A. Somayaji, and S. Forrest, "Intrusion detection using sequences of system calls," Journal of Computer Security, Vol. 6, 1998, pp. 151-180.
  11. T. F. Lunt, "Detecting intruders in computer sys- tems," Conference on auditing and computer technology, 1993.
  12. A. J. Menezes, P. C. Oorshot, and S. A. Vanstone, Handbook of Applied Cryptography, Fifth Edi- tion, CRC Press, New York, 2001.
  13. B. Misztal, "Trust in modern societies," Polity Press, Cambridge MA, Polity Press, Cambridge MA, 1996.
  14. S. E. Smaha and J. Winslow, "Misuse detection tools," Journal of Computer Security, Vol. 10, No. 1, 1994, pp. 39-49.