Skip to main content
Log in

Trust Brokering and Its Use for Resource Matchmaking in Public-Resource Grids

  • Published:
Journal of Grid Computing Aims and scope Submit manuscript

Abstract

This paper presents a trust brokering system that operates in a peer-to-peer manner. The network of trust brokers operate by providing peer reviews in the form of recommendations regarding potential resource targets. One of the distinguishing features of our work is that it separately models the accuracy and honesty concepts. By separately modeling these concepts, our model is able to significantly improve the performance. We apply the trust brokering system to a resource manager to illustrate its utility in a public-resource Grid environment. The simulations performed to evaluate the trust-aware resource matchmaking strategies indicate that high levels of ‘robustness’ can be attained by considering trust while matchmaking and allocating resources.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Hawaii International Conference System Sciences, 2000

  2. Aberer, K., Despotovic, Z.: Managing trust in a peer-2-peer information system. In: 10th International Conference on Information and Knowledge Management (CIKM’01), pp. 310–317, 2001

  3. Azzedin, F., Maheswaran, M.: Integrating trust into Grid resource management systems. In: 2002 International Conference Parallel Processing (ICPP ’02), pp. 47–54, 2002

  4. Chen, R., Yeager, W.: Poblano: A Distributed Trust Model for Peer-to-Peer Networks. http://security.jxta.org (2001)

  5. Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Samarati, P., Violante, F.: A Reputation-based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In: 9th ACM Conference on Computer and Communications Security, pp. 207–216, 2002

  6. Dingledine, R., Freedman, M.J., Molnar, D.: Accountability. In: Oram, A. (ed.) Peer-to-Peer: Harnessing the Power of Disruptive Technologies, pp. 271–340. O'Reilly and Associates, Sebastopol, California (2001)

  7. Foster, I., Kesselman, C. (eds.): The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann, San Francisco, California (1999)

  8. Foster, I., Iamnitchi, A.: On death, taxes, and the convergence of peer-to-peer and Grid computing. In: 2nd International Workshop on Peer-to-Peer Systems (IPTPS03), 2003

  9. Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the Grid: Enabling scalable virtual organizations. Int. J. Supercomput. Appl. (2001)

  10. Gong, L.: JXTA: A network programming environment. IEEE Internet Computing 5(3), 88–95 (2001)

    Article  Google Scholar 

  11. Habra, N., Chalier, B.L., Mounji, A., Mathieu, I.: ASAX: Software architecture and rule-based language for universal audit trail analysis. In: European Symposium on Research in Computer Security (ESORIC'92), pp. 435–450, 1992

  12. Katz, Y., Golbeck, J.: Social network-based trust in prioritized default logic. In: 21st National Conference on Artificial Intelligence (AAAI-06), 2006

  13. Kim, M., Noble, B.: Mobile Networks Estimation. In: 7th Annual Conference on Mobile Computing and Networking, 2001

  14. Lunt, T.F.: Detecting intruders in computer systems. In: Conference on Auditing and Computer Technology, 1993

  15. Maheswaran, M., Ali, S., Siegel, H.J., Hensgen, D., Freund, R.F.: Dynamic mapping of a class of independent tasks onto heterogeneous computing systems. J. Parallel Distrib. Comput. 59(2), 107–131 (1999)

    Article  Google Scholar 

  16. Pierre, G., van Steen, M.: A trust model for peer-to-peer content distribution networks (2001)

  17. Sen, S., Sajja, N.: Robustness of reputation-based trust: Boolean case. In: 1st International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS-02), pp. 288–293, 2002

  18. Smaha, S.E., Winslow, J.: Misuse detection tools. J. Comput. Secur. 10(1), 39–49 (1994)

    Google Scholar 

  19. Waldman, M., Cranor, L.F., Rubin, A.: Trust. In: Oram, A. (ed.) Peer-to-Peer: Harnessing the Power of Disruptive Technologies, pp. 271–340. O'Reilly and Associates, Sebastopol, California (2001)

    Google Scholar 

  20. Yu, B., Singh, M.P.: An evidential model for distributed reputation management. In: 1st Int'l Joint Conf. Autonomous Agents and Multi-Agent Systems (AAMAS-02), pp. 294–301, 2002

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Farag Azzedin.

Additional information

Dr Azzedin contributed towards the work in this paper while he was at University of Manitoba, Winnipeg, Canada.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Azzedin, F., Maheswaran, M. & Mitra, A. Trust Brokering and Its Use for Resource Matchmaking in Public-Resource Grids. J Grid Computing 4, 247–263 (2006). https://doi.org/10.1007/s10723-006-9041-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10723-006-9041-9

Key words

Navigation