Assessing security threat scenarios for utility-based reputation model in grids

被引:8
|
作者
Kussul, Olga [1 ]
Kussul, Nataliia [1 ,2 ]
Skakun, Sergii [1 ,2 ]
机构
[1] Natl Tech Univ Ukraine, Kyiv Polytech Inst, Inst Phys & Technol, UA-03056 Kiev, Ukraine
[2] Space Res Inst NASU NSAU, 40 Glushkov Prospekt,Bldg 4-1, UA-03680 Kiev, Ukraine
关键词
Trust; Reputation model; Grid computing; Utility; Security threats; TRUST; MANAGEMENT; SERVICE;
D O I
10.1016/j.cose.2013.01.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Trust and reputation models play an important role in enabling trusted computations over large-scale distributed grids. Many models have been recently proposed and implemented within trust management systems. Nevertheless, the existing approaches usually assess performance of models in terms of resource management while less attention is paid to the analysis of security threat scenarios for such models. In this paper, we assess the most important and critical security threats for a utility-based reputation model in grids. The existing model is extended to address these threat scenarios. With simulations that were run using data collected from the EGEE Grid-Observatory project, we analyse efficiency of the utility-based reputation model against these threats. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 50 条
  • [1] A Utility-Based Reputation Model for the Internet of Things
    Aziz, Benjamin
    Fremantle, Paul
    Wei, Rui
    Arenas, Alvaro
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2016, 2016, 471 : 261 - 275
  • [2] A utility-based reputation model for service-oriented computing
    Silaghi, Gheorghe Cosmin
    Arenas, Alvaro E.
    Silva, Luis Moura
    [J]. TOWARDS NEXT GENERATION GRIDS, 2007, : 63 - +
  • [3] A UTILITY-BASED REPUTATION MODEL FOR GRID RESOURCE MANAGEMENT SYSTEM
    Kussul, Olga
    Kussul, Nataliia
    Skakun, Sergii
    [J]. COMPUTING AND INFORMATICS, 2014, 33 (05) : 1139 - 1167
  • [4] Utility-based replication strategies in data grids
    You, Xindong
    Chang, Guiran
    Chen, Xueyao
    Tian, Cuihua
    Zhu, Chuan
    [J]. GCC 2005: FIFTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2006, : 500 - +
  • [5] Utility-based Uploading Strategy in Cloud Scenarios
    Wan, Ziqi
    Wu, Jie
    Zheng, Huanyang
    [J]. 24TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS ICCCN 2015, 2015,
  • [6] Utility-based VM Assignment in Cloud Scenarios
    Wan, Ziqi
    Wu, Jie
    [J]. 2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [7] ASSESSMENT OF VARIOUS SCENARIOS FOR UTILITY-BASED COGENERATION IN ONTARIO
    ROSEN, MA
    [J]. ENERGY, 1994, 19 (11) : 1143 - 1149
  • [8] Utility-based Network Adversary Model
    Tan, Yunmeng
    Liao, Shengbin
    [J]. 2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL II, 2010, : 421 - 424
  • [9] Utility-Based Network Adversary Model
    Tan, Yunmeng
    Liao, Shengbin
    [J]. APPLIED INFORMATICS AND COMMUNICATION, PT 2, 2011, 225 : 684 - +
  • [10] A utility-based adaptivity model for mobile applications
    Alia, Mourad
    Eide, Viktor S. Wold
    Paspallis, Nearchos
    Eliassen, Frank
    Hallsteinsen, Svein O.
    Papadopoulos, George A.
    [J]. 21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS WORKSHOPS/SYMPOSIA, VOL 2, PROCEEDINGS, 2007, : 556 - +