Skip to main content
Log in

Adaptive trust management framework in P2P grid computing

  • Published:
Wuhan University Journal of Natural Sciences

Abstract

In P2P Grid computing systems, the authorization decision is often tackled by two different trust management methods: policy-based approach, where authorization are built on logical rules and verifiable properties encoded in signed credentials, and reputation-based approach, based on collecting, aggregating and disseminating reputation among the peers. However, the overhead caused by proof of compliance on authorization and the absence of certifying authorities may negate the strong and objective security advantages of policy-based approach, whilst vagueness, complexity and inaccurate characterization caused by reputation evolution may eliminate the quantitative and flexible advantages of reputation-based approach. We propose an adaptive trust management framework, which combines the merit of policy proof and reputation evolution such that authorization is aware of not only the strong and objective security traits, but also the calculability and the availability security traits. Finally, the framework of system is proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Berman F, Fox G, Hey T. Grid Computing: Making the Global Infrastructure a Reality [M]. London: John Wiley & Sons Press, 2003.

    Google Scholar 

  2. Ren S, Guo L, Jiang S. SAT-Match: A Self-Adaptive Topology Matching Method to Achieve Low Lookup Latency in Structured P2P Overlay Networks[C]// Proc of the 18th Int’l Parallel and Distributed Processing Symp (IPDPS 2004). New York: IEEE Press, 2004: 83–91.

    Google Scholar 

  3. Grandison T. Trust Management for Internet Applications [D]. London: Imperial College, 2003.

    Google Scholar 

  4. Kamvar S D, Schlosser M T, Garcia-Molina H. Eigenrep: Reputation Management in P2P Networks[C]// Proc of 12th International www Conference, New York: ACM Press, 2003: 640–651.

    Google Scholar 

  5. Li Ninghui, Winsborough W H, Mitchell J C. Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management[C]// Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, 2003: 123–139.

  6. Blaze M, Feigenbaum J, Lacy J. Decentralized Trust Management[C]//Proceedings of the 17th Symposium on Security and Privacy. Okaland: IEEE Computer Society Press, 1996: 164–173.

    Google Scholar 

  7. Staab S, Bhargava B K, Lilien L, et al. The Pudding of Trust. IEEE Intelligent Systems[J], 2004, 19(5): 74–88.

    Article  Google Scholar 

  8. Grandison T, Sloman M. Specifying and Analyzing Trust for Internet Applications in Towards the Knowledge Society: eCommerce, eBusiness, and eGovernment[C]//The Second IFIP Conference on E-Commerce, E-Business, E-Government (I3E 2002), New York: Springer, 2002: 145–157.

    Google Scholar 

  9. Beth T, Borcherding M, Klein B. Valuation of Trust in Open Networks[C]//Proceedings of the European Symposium on Research in Security (ESORICS). Brighton: Springer-Verlag, 1994:3–18.

    Google Scholar 

  10. Dimmock N, Belokosztolszki A, Eyers D. Using Trust and Risk in Role-Based Access Control Policies [C]//Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies (SACMAT). New York: ACM Press, 2004: 156–162.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jingzhu Hu.

Additional information

Foundation item: Supported by the Open Research Foundation of National Key Laboratory (SKLSE04-018), National Social Science Foundation of China (06BTQ024) and the Science and Technical Key Project of Hubei Province (2005AA101C43)

Biography: WANG Yinglong(1958–), male, Ph.D. candidate, research direction: computer network & information security

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, Y., Hu, J. Adaptive trust management framework in P2P grid computing. Wuhan Univ. J. Nat. Sci. 13, 33–36 (2008). https://doi.org/10.1007/s11859-008-0107-3

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-008-0107-3

Key words

CLC number

Navigation