Journal of Grid Computing

, Volume 4, Issue 3, pp 247–263 | Cite as

Trust Brokering and Its Use for Resource Matchmaking in Public-Resource Grids

  • Farag Azzedin
  • Muthucumaru Maheswaran
  • Arindam Mitra


This paper presents a trust brokering system that operates in a peer-to-peer manner. The network of trust brokers operate by providing peer reviews in the form of recommendations regarding potential resource targets. One of the distinguishing features of our work is that it separately models the accuracy and honesty concepts. By separately modeling these concepts, our model is able to significantly improve the performance. We apply the trust brokering system to a resource manager to illustrate its utility in a public-resource Grid environment. The simulations performed to evaluate the trust-aware resource matchmaking strategies indicate that high levels of ‘robustness’ can be attained by considering trust while matchmaking and allocating resources.

Key words

trust brokering Grid computing trust aware matchmaking resource allocation 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Hawaii International Conference System Sciences, 2000Google Scholar
  2. 2.
    Aberer, K., Despotovic, Z.: Managing trust in a peer-2-peer information system. In: 10th International Conference on Information and Knowledge Management (CIKM’01), pp. 310–317, 2001Google Scholar
  3. 3.
    Azzedin, F., Maheswaran, M.: Integrating trust into Grid resource management systems. In: 2002 International Conference Parallel Processing (ICPP ’02), pp. 47–54, 2002Google Scholar
  4. 4.
    Chen, R., Yeager, W.: Poblano: A Distributed Trust Model for Peer-to-Peer Networks. (2001)
  5. 5.
    Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Samarati, P., Violante, F.: A Reputation-based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In: 9th ACM Conference on Computer and Communications Security, pp. 207–216, 2002Google Scholar
  6. 6.
    Dingledine, R., Freedman, M.J., Molnar, D.: Accountability. In: Oram, A. (ed.) Peer-to-Peer: Harnessing the Power of Disruptive Technologies, pp. 271–340. O'Reilly and Associates, Sebastopol, California (2001)Google Scholar
  7. 7.
    Foster, I., Kesselman, C. (eds.): The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann, San Francisco, California (1999)Google Scholar
  8. 8.
    Foster, I., Iamnitchi, A.: On death, taxes, and the convergence of peer-to-peer and Grid computing. In: 2nd International Workshop on Peer-to-Peer Systems (IPTPS03), 2003Google Scholar
  9. 9.
    Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the Grid: Enabling scalable virtual organizations. Int. J. Supercomput. Appl. (2001)Google Scholar
  10. 10.
    Gong, L.: JXTA: A network programming environment. IEEE Internet Computing 5(3), 88–95 (2001)CrossRefGoogle Scholar
  11. 11.
    Habra, N., Chalier, B.L., Mounji, A., Mathieu, I.: ASAX: Software architecture and rule-based language for universal audit trail analysis. In: European Symposium on Research in Computer Security (ESORIC'92), pp. 435–450, 1992Google Scholar
  12. 12.
    Katz, Y., Golbeck, J.: Social network-based trust in prioritized default logic. In: 21st National Conference on Artificial Intelligence (AAAI-06), 2006Google Scholar
  13. 13.
    Kim, M., Noble, B.: Mobile Networks Estimation. In: 7th Annual Conference on Mobile Computing and Networking, 2001Google Scholar
  14. 14.
    Lunt, T.F.: Detecting intruders in computer systems. In: Conference on Auditing and Computer Technology, 1993Google Scholar
  15. 15.
    Maheswaran, M., Ali, S., Siegel, H.J., Hensgen, D., Freund, R.F.: Dynamic mapping of a class of independent tasks onto heterogeneous computing systems. J. Parallel Distrib. Comput. 59(2), 107–131 (1999)CrossRefGoogle Scholar
  16. 16.
    Pierre, G., van Steen, M.: A trust model for peer-to-peer content distribution networks (2001)Google Scholar
  17. 17.
    Sen, S., Sajja, N.: Robustness of reputation-based trust: Boolean case. In: 1st International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS-02), pp. 288–293, 2002Google Scholar
  18. 18.
    Smaha, S.E., Winslow, J.: Misuse detection tools. J. Comput. Secur. 10(1), 39–49 (1994)Google Scholar
  19. 19.
    Waldman, M., Cranor, L.F., Rubin, A.: Trust. In: Oram, A. (ed.) Peer-to-Peer: Harnessing the Power of Disruptive Technologies, pp. 271–340. O'Reilly and Associates, Sebastopol, California (2001)Google Scholar
  20. 20.
    Yu, B., Singh, M.P.: An evidential model for distributed reputation management. In: 1st Int'l Joint Conf. Autonomous Agents and Multi-Agent Systems (AAMAS-02), pp. 294–301, 2002Google Scholar

Copyright information

© Springer Science+Business Media B.V. 2006

Authors and Affiliations

  • Farag Azzedin
    • 1
  • Muthucumaru Maheswaran
    • 2
  • Arindam Mitra
    • 3
  1. 1.Department of Information and Computer ScienceKing Fahd Univ. of Petroleum and MineralsDhahranSaudi Arabia
  2. 2.School of Computer ScienceMcGill UniversityMontrealCanada
  3. 3.Department of Computer ScienceUniversity of ManitobaWinnipegCanada

Personalised recommendations