Early Experience of Remote and Hot Service Deployment with Trustworthiness in CROWN Grid

  • Hailong Sun
  • Yanmin Zhu
  • Chunming Hu
  • Jinpeng Huai
  • Yunhao Liu
  • Jianxin Li
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3756)


CROWN Grid aims to empower in-depth integration of resources and cooperation of researchers nationwide and worldwide. In such a distributed environment, to facilitate adoption of services, remote and hot service deployment is highly desirable. Furthermore, when the deployer and the target container are from different domains, great security challenges arise when a service is deployed to the remote container. In this paper, we present ROST, an original scheme of Remote & hOt Service deployment with Trustworthiness. By dynamically updating runtime environment configurations, ROST avoids restarting the runtime system during deployment. Moreover, we adopt trust negotiation in ROST to assure the security of service deployment. We conduct experiments in a real grid environment, and evaluate ROST comprehensively.


Service grid CROWN Remote and hot deployment ROST Trust Negotiation Agent (TNA) 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Foster, I., Kesselman, C., Tuecke, S.: The Anatomy of the Grid: Enabling Scalable Virtual Organization. The International Journal of High Performance Computing Applications 15, 200–222 (2001)CrossRefGoogle Scholar
  2. 2.
    Foster, I., Kesselman, C.: The Grid 2: Blueprint for a New Computing Infrastructure. Morgan Kaufmann, San Francisco (2003)Google Scholar
  3. 3.
    Foster, I., Kesselman, C., Nick, J.M., Tuecke, S.: Grid Services for Distributed System Integration. IEEE Computer 35, 37–46 (2002)Google Scholar
  4. 4.
    Bernardo, L., Pinto, P.: Scalable Service Deployment using Mobile Agents. In: presented at the Second International Workshop on Mobile Agents (1998)Google Scholar
  5. 5.
    Bossardt, M., Muhlemann, A., Zurcher, R., Plattner, B.: Pattern Based Service Deployment for Active Networks. In: presented at the Second International Workshop on Active Network Technologies and Applications (2003)Google Scholar
  6. 6.
    The Globus Toolkit,
  7. 7.
  8. 8.
    Fleury, M., Reverbel, F.: The JBoss Extensible Server. In: Endler, M., Schmidt, D.C. (eds.) Middleware 2003. LNCS, vol. 2672. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  9. 9.
  10. 10.
    Friese, T., Smith, M., Freisleben, B.: Hot Service Deployment in an Ad Hoc Grid Environment. In: presented at International Conference on Service Oriented Computing (2004)Google Scholar
  11. 11.
    Goscinski, W., Abramson, D.: Distributed Ant: A System to Support Application Deployment in the Grid. In: presented at the Fifth IEEE/ACM International Workshop on Grid Computing (2004)Google Scholar
  12. 12.
    Baude, F., Caromel, D., Huet, F., Mestre, L., Vayssiere, J.: Interactive and Descriptor-based Deployment of Object-Oriented Grid Applications. In: presented at the 11th IEEE International Symposium on High Performance Distributed Computing (2002)Google Scholar
  13. 13.
  14. 14.
    Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A Security Architecture for Computational Grids. In: presented at the 5th ACM Conference on Computer and Communications Security (1998)Google Scholar
  15. 15.
    Winsborough, W.H., Seamons, K.E., Jones, V.E.: Automated Trust Negotiation. In: presented at DARPA Information Survivability Conference and Exposition (2000)Google Scholar
  16. 16.
    Li, N., Winsborough, W.H., Mitchell, J.C.: Distributed Credential Chain Discovery in Trust Management. In: presented at the 8th ACM Conference on Computer and Communications Security (2001)Google Scholar
  17. 17.
    Winsborough, W.H., Li, N.: Towards Practical Automated Trust Negotiation. In: presented at the 3rd International Worshop on Policies for Distributed Systems and Networks(POLICY 2002) (2002)Google Scholar
  18. 18.
    Winsborough, W.H., Li, N.: Safety in Automated Trust Negotiation. In: presented at IEEE Symposium on Security and Privacy (2004)Google Scholar
  19. 19.
    Winslett, M., Yu, T., Seamons, K.E., Hess, A., Jacobson, J., Jarvis, R., Smith, B., Yu, L.: Negotiating Trust on the Web. IEEE Internet Computing 6 (2002)Google Scholar
  20. 20.
    Yu, T., Winslett, M.: A Unified Scheme for Resouce Protection in Automated Trust Negotiation. In: presented at IEEE Symposium on Security and Privacy (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Hailong Sun
    • 1
  • Yanmin Zhu
    • 2
  • Chunming Hu
    • 1
  • Jinpeng Huai
    • 1
  • Yunhao Liu
    • 2
  • Jianxin Li
    • 1
  1. 1.School of Computer ScienceBeihang UniversityBeijingChina
  2. 2.Department of Computer ScienceHong Kong University of Science & TechnologyHong Kong

Personalised recommendations