Enhancing grid security with trust management

Ching Lin*, Vijay Varadharajan, Yan Wang, Vineet Pruthi

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

82 Citations (Scopus)

Abstract

Recently, trust has been recognized as an important factor for Grid computing security. In this paper, we develop a trust management architecture for trust enhanced Grid security incorporating a novel trust model which is capable of capturing various types of trust relationships that exist in a Grid system and providing mechanisms for trust evaluation, recommendations and update for trust decisions. The outcomes of the trust decisions can then be employed by the Grid security system to formulate trust enhanced security solutions. We design several algorithms to demonstrate how one can derive the trust enhanced security solutions for both user and resource provider protection with the proposed trust management architecture. Leveraging on trust knowledge and forming it as part of the security decisions, the proposed architecture possesses several desirable emerging properties that enable it to provide an improved level of security for Grid computing systems.

Original languageEnglish
Title of host publicationProceedings - 2004 IEEE International Conference on Services Computing, SCC 2004
EditorsL.J. Zhang, M. Li, A.P. Sheth, K.G. Jeffery
Place of PublicationLos Alamitos, CA
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages303-310
Number of pages8
ISBN (Print)0769522254, 9780769522258
DOIs
Publication statusPublished - 2004
EventProceedings - 2004 IEEE International Conference on Services Computing, SCC 2004 - Shanghai, China
Duration: 15 Sep 200418 Sep 2004

Other

OtherProceedings - 2004 IEEE International Conference on Services Computing, SCC 2004
CountryChina
CityShanghai
Period15/09/0418/09/04

Keywords

  • grid computing
  • security
  • trust

Fingerprint Dive into the research topics of 'Enhancing grid security with trust management'. Together they form a unique fingerprint.

Cite this