A robust reputation system for the grid
2006, Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID'06)
https://doi.org/10.1109/CCGRID.2006.9Abstract
Typically, users of the Grid (i.e. resource consumers) identify resources to submit their tasks based on the resources' capabilities, e.g. processor type, memory size, etc. However, the reliability of the users who manage the resources (i.e. resource providers) is usually unknown to the consumers, e.g. one provider may intentionally drop a consumer's submitted task in favor of another consumer's task since the latter can pay more. Therefore, there is a risk for consumers that their submitted tasks may fail. Establishing reputation systems is a good alternative to manage this risk [1]. However, existing work regarding the reputation systems in the Grid mainly focuses on methods to calculate reputation to model resource providers' reliability. They do not effectively mitigate the influence of inaccurate testimonies and malicious referrers, which are common phenomena in real environments. Against this background, this paper proposes a robust reputation system that has components to mitigate the influence of the inaccurate testimonies and malicious referrers. Experimental results show that the proposed system is efficient in mitigating the influence of these inaccurate testimonies and malicious referrers.
References (14)
- B. Alunkal, I. Veljkovic, G. von Laszewski, and K. Aminand. Reputation-based grid resource selection. In Proceedings of Workshop on Adaptive Grid Middleware (AGridM 2003), 2003.
- B. Barber. The logic and limits of trust. Rutgers University Press, 1983.
- A. M. Collins and E. F. Loftus. A spreading activation theory of se- mantic processing. Psychological Review, 82(6):407-428, 1975.
- F. Crestani. Application of spreading activation techniques in informa- tion retrieval. Artificial Intelligence Review, 11(6):453-482, 1997.
- E. Damiani, D. C. di Vimercati, S. Paraboschi, P. Samarati, and F. Vi- olante. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proceedings of the 9th ACM conference on Computer and Communications Security, pages 207-216, 2002.
- I. Foster, C. Kesselman, and S. Tuecke. The anatomy of the grid: Enabling scalable virtual organizations. International Journal of Su- percomputer Applications, 15(3):200-222, 2001.
- N. Griffiths and K.-M. Chao. Experience-based trust: Enabling effective resource selection in a grid environment. In Proceedings of iTrust 2005, pages 240-255, 2005.
- A. Jøsang, S. Hird, and E. Faccer. Simulating the effect of reputation systems on e-markets. In Proceedings of iTrust 2003, pages 179-194, 2003.
- A. Jøsang and R. Ismail. The beta reputation system. In Proceedings of the 15th Bled Conference on Electronic Commerce, 2002.
- N. Littlestone and M. K. Warmuth. The weighted majority algorithm. Information and Computation, 108(2):212-261, Feb 1994.
- J. Weng, C. Miao, and A. Goh. Protecting online rating systems from unfair ratings. In Proceedings of TrustBus 2005, 2005.
- A. Whitby, A. Jøsang, and J. Indulska. Filtering out unfair ratings in bayesian reputation systems. In Proceedings of the Workshop on Trust in Agent Societies at AAMAS2004, 2004.
- P. Yolum and M. P. Singh. Engineering self-organizing referral networks for trustworthy service selection. IEEE Transactions on Systems, Man, and Cybernetics, To appear, 2005.
- C.-N. Ziegler and G. Lausen. Spreading activation models for trust propagation. In Proceedings of 2004 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 04), pages 83-97, 2004.