Skip to main content

Trust Management for Grid Environment Using Rule Based Fuzzy Logic

  • Conference paper
Advances in Network Security and Applications (CNSA 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 196))

Included in the following conference series:

Abstract

Grid computing system is an open, dynamic and service-oriented environment. There are multiple service providers, which offer services in Grid to users. In order to make the entity use the resources and deploy services with safety and reliability, the “trust” notion is addressed. Trust mechanism has been focus of much research in recent years providing a safety and reliable Grid computing environment. In this paper we have proposed a technique for calculating the trust based on the rule based fuzzy logic. Three parameters reliability, capability, and user satisfaction are taken as an input and output is trust factor. We have implemented and evaluated the performance using GridSim simulator.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sun, M., Zeng, G., Wang, W.: A Trust-Oriented Heuristic Scheduling Algorithm for Grid Computing. In: Malyshkin, V.E. (ed.) PaCT 2007. LNCS, vol. 4671, pp. 608–614. Springer, Heidelberg (2007)

    Google Scholar 

  2. Wang, W., Zeng, G.: Trusted dynamic level scheduling based on Bayes trust model. In: Science in China Series F: Information Science. LNCS, vol. 50(3), pp. 456–469 (June 2007)

    Google Scholar 

  3. Chen, H., Ye, Z., Liu, W., Wang, C.: Fuzzy Inference Trust in P2P Network Environment. In: Proc. 2rd IEEE Conf. International Workshop on Intelligent Systems and Application, (ISA 2010) (2010)

    Google Scholar 

  4. Hongmei, L., Qianping, W., Guoxin, L.: A Fuzzy Logic-Based Trust Model in Grid. In: International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCT 2009, pp. 608–614 (August 2009)

    Google Scholar 

  5. Tang, W., Chen, Z.: Research of subjective trust management model based on the fuzzy set theory. Journal of software 14(8), 1401–1408 (2003)

    MATH  Google Scholar 

  6. Tang, W., Hu, J.B., Chen, Z.: Research on a Fuzzy Logic-Based Subjective Trust Management Model. Journal of Computer Research and Development 42(10), 1654–1659 (2005)

    Article  Google Scholar 

  7. Song, S., Hwang, K., Macwan, M.: Fuzzy Trust Integration for Security Enforcement in Grid Computing. In: Jin, H., Gao, G.R., Xu, Z., Chen, H. (eds.) NPC 2004. LNCS, vol. 3222, pp. 9–21. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. GridSim toolkit, http://www.gridbus.org/gridsim/

  9. Zhu, C., Tang, X., Li, K., Han, X., Zhu, X., Qi, X.: Integrating Trust into Grid Economic Model Scheduling Algorithm. In: Meersman, R., Tari, Z. (eds.) GADA 2006. LNCS, vol. 4276, pp. 1263–1272. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  10. Foster, C.K.: The Grid 2 Blueprint for a New Computing Infrastructure. Theseries in grid computing

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Siddiqui, M.N., Saini, V., Ahuja, R. (2011). Trust Management for Grid Environment Using Rule Based Fuzzy Logic. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Advances in Network Security and Applications. CNSA 2011. Communications in Computer and Information Science, vol 196. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22540-6_63

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22540-6_63

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22539-0

  • Online ISBN: 978-3-642-22540-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics