CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Specification of Parameters Relevant for Trust Evaluation in an Adhoc Grid Environment

by Slavom´ır Kaveck´y, Penka Martincov´a
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 132 - Number 11
Year of Publication: 2015
Authors: Slavom´ır Kaveck´y, Penka Martincov´a
10.5120/ijca2015907586

Slavom´ır Kaveck´y, Penka Martincov´a . Specification of Parameters Relevant for Trust Evaluation in an Adhoc Grid Environment. International Journal of Computer Applications. 132, 11 ( December 2015), 1-8. DOI=10.5120/ijca2015907586

@article{ 10.5120/ijca2015907586,
author = { Slavom´ır Kaveck´y, Penka Martincov´a },
title = { Specification of Parameters Relevant for Trust Evaluation in an Adhoc Grid Environment },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 132 },
number = { 11 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume132/number11/23635-2015907586/ },
doi = { 10.5120/ijca2015907586 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:29:04.157823+05:30
%A Slavom´ır Kaveck´y
%A Penka Martincov´a
%T Specification of Parameters Relevant for Trust Evaluation in an Adhoc Grid Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 132
%N 11
%P 1-8
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The purpose of security in ad hoc grid environments is to support secure execution of tasks on shared resources and to protect the resources from malicious user actions. The mechanisms of authentication and authorization commonly used in traditional grid environments are not sufficient to cover all security requirements arising from the decentralized nature of the ad hoc grid. However, the concept of trust management is capable to solve the security issues by incorporating trust into the process of decision making whether or not to execute a user’s task on a selected resource. The quality of made decisions is dependent on a correct assessment and representation of trustworthiness assigned to the potentially collaborating parties. In most cases the value of trustworthiness is derived at least from direct trust and recommendations, but other factors as risk, uncertainty, context dependant information and attributes characterizing the task and the shared resource should be included in the derived value as well. This paper presents an overview of the trust evaluation process and provides a specification of parameters relevant for an accurate trust evaluation.

References
  1. Kaizar Amin, Gregor von Laszewski, and Armin R. Mikler. Toward an architecture for ad hoc grids. In 12th International Conference on Advanced Computing and Communications (ADCOM 2004), Ahmedabad, pages 15–18, 2004.
  2. Michael Brinklov and Robin Sharp. Incremental trust in grid computing. In Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid, CCGRID ’07, pages 135–144, 2007.
  3. Ioanna Dionysiou and Harald Gjermundrod. sguts: Simplified grid user trust service for site selection. In The Seventh International Conference on Internet Monitoring and Protection, 2012, pages 40–46, May 2012.
  4. Colin English, Sotirios Terzis, and Waleed Wagealla. Engineering trust based collaborations in a global computing environment. In Trust Management, volume 2995 of Lecture Notes in Computer Science, pages 120–134, 2004.
  5. Audun Jøsang, Roslan Ismail, and Colin Boyd. A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2):618–644, mar 2007.
  6. Audun Jøsang, Claudia Keser, and Theo Dimitrakos. Can we manage trust? In Trust Management, volume 3477 of Lecture Notes in Computer Science, pages 93–107. Springer Berlin Heidelberg, 2005.
  7. Audun Jøsang and St´ephane Lo Presti. Analysing the relationship between risk and trust. In Trust Management, volume 2995 of Lecture Notes in Computer Science, pages 135–145. Springer Berlin Heidelberg, 2004.
  8. Ching Lin, Vijay Varadharajan, YanWang, and Vineet Pruthi. Enhancing grid security with trust management. In Proceedings of the 2004 IEEE International Conference on Services Computing, 2004., pages 303–310, Sept 2004.
  9. P.D. Manuel, S. Thamarai Selvi, and M.IA-E. Barr. Trust management system for grid and cloud resources. In First International Conference onAdvanced Computing, 2009., pages 176–181, Dec 2009.
  10. Elvis Papalilo and Bernd Freisleben. Managing behaviour trust in grid computing environments. Journal of Information Assurance and Security, 3:27–37, March 2008.
  11. Jianqiang Shi, Gregor v. Bochmann, and Carlisle Adams. A trust model with statistical foundation. In Formal Aspects in Security and Trust, volume 173 of IFIP International Federation for Information Processing, pages 145–158. Springer US, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Grid entity trust evaluation trust value parameters parameters classification