Abstract
This Work Explores The Potential Of Employing Service Level Agreements To Make Grids Sabotage Tolerant. The Complex Nature Of The Grid Requires Comprehensive Security And Trust Solutions That Can Encompass Different Aspects Of Their Operational Environments. In This Paper, We Argue That The Use Of Service Level Agreement (Sla) Based Exchange Of Information (Negotiations Of Slacontracts) Can Enhance The Efficiency Of The Grid Security Architecture By Providing A Sabotage Tolerant System Design. The Use Of An Sla-Based Approach Covers Nearly The Entire Spectrum Of The Grid Applications And Grid Based Systems, Where Sabotage Tolerance Is An Essential Requirement, Especially In The Case When The Grid Spans The Organizational Border, Moving Under The Collaborative Control Of Potential Competing Stakeholders.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
David P. Anderson. Boinc: A system for public-resource computing and storage. In: GRID ’04: The Fifth IEEE/ACM International Workshop on Grid Computing, pages 4-10, Washington, DC, USA, 2004. IEEE Computer Society.
Steve Anderson et al.Web services secure conversation language(WS- SecureConversation), September, 2005.
A. Andrieux, K. Czajkowski, A. Dan, K. Keahey, H. Ludwig, J. Pruyne, J. Rofrano, S. Tuecke, and Ming Xu. Web services agreement specification (WS-Agreement), September 20, 2005.
Commercial grid solutions. Grid Computing Planet, December 18, 2006. available at http://www.gridcomputingplanet.com/resources/article.php/933781.
Y. Demchenko, L. Gommans, C. de Laat, and B. Oudenaarde. Web services and grid security vulnerabilities and threats analysis and model. In: GRID ’05: The 6th IEEE/ACM International Workshop on Grid Computing, pages 262-267, Washington, DC, USA, 2005. IEEE Computer Society.
P. Domingues, B. Sousa, and L.M. Silva. Sabotage-tolerance and trust management in Desktop Grid computing. Future Gener. Comput. Syst., 23(7):904-912, 2007.
Wenliang Du, Jing Jia, M. Mangal, and M. Murugesan. Uncheatable grid computing. In: ICDCS ’04: The 24th International Conference on Distributed Computing Systems (ICDCS’04), pages 4-11, Washington, DC, USA, 2004. IEEE Computer Society.
J. Ermisch and D. Gambetta. People’s trust: The design of a survey-based experiment. IZA Discussion Papers 2216, Institute for the Study of Labor (IZA), 2006. available at http://ideas.repec.org/p/iza/izadps/dp2216.html.
J. Hughes et al. Technical overview of the oasis security assertion markup language (SAML), v1.1. OASIS, May, 2004.
D. Kondo, F. Araujo, P. Malecot, P. Domingues, L.M. Silva, G. Fedak, and F. Cappello. Characterizing result errors in Internet Desktop Grids. In Euro-Par 2007, 13th International Euro-Par Conference on Parallel Processing, Rennes, France, 2007, vol. 4641 of LNCS, pages 361-371. Springer.
J. Li, R. Yahyapour. Negotiation strategies for grid scheduling. In 1st International Conference on Grid and Pervasive Computing, 2006, vol. 3947 of LNCS. Springer.
F. Monrose, P. Wyckoff, and A.D. Rubin. Distributed execution with remote audit. In The Network and Distributed System Security Symposium, NDSS 1999, San Diego, California, USA. The Internet Society.
Project ASSESSGRID. http://www.assessgrid.eu.
Project HPC4U. http://www.hpc4u.org.
Project XtreemOS. http://www.xtreemos.eu.
Luis F. G. Sarmenta. Sabotage-tolerance mechanisms for volunteer computing systems. Future Gener. Comput. Syst., 18(4):561-572, 2002.
K. Tserpes, D. Kyriazisa, A. Menychtasa and T. Varvarigoua. A novel mechanism for pro- visioning of high-level quality of service information in grid environments. In European Journal of Operational Research, Article in press, Corrected proof, 2007, Elsevier
XtreemOS.First draft specification of security services, project deliver- able D3.5.3.http://www.xtreemos.eu/publications/project-deliverables/d3-5-3- firstspecofsecurityservices vfinal.pdf, 2007.
E.Y. Yang, B. Matthews, A. Lakhani, Y. J égou et. al. Virtual organization management in XtreemOS: an overview. In Towards Next Generation Grids, Proc. of the CoreGRID Symposium, Rennes, France, 2007. Springer.
S. Zhao, V. Lo, and C. GauthierDickey. Result verification and trust-based scheduling in peer-to-peer grids. In: P2P ’05: The 5th IEEE International Conference on Peer-to-Peer Computing (P2P’05), pages 31-38, Washington, DC, USA, 2005. IEEE Computer Society.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Naqvi, S. et al. (2008). Using Sla Based Approach To Handle Sabotage Tolerance In The Grids. In: Priol, T., Vanneschi, M. (eds) From Grids to Service and Pervasive Computing. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-09455-7_11
Download citation
DOI: https://doi.org/10.1007/978-0-387-09455-7_11
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-09454-0
Online ISBN: 978-0-387-09455-7
eBook Packages: Computer ScienceComputer Science (R0)