Reliable Accounting in Grid Economic Transactions
In the Grid computing model a remote service is provided by a resource owner to a client. The resource owner executes a client job and charges the client for a corresponding fee. In this paper we discuss the main weakness of many existing models for performing such a kind of transaction, i.e., the strong assumption that both the resource owner and the clients are honest. Then, we propose a new security model in which either the resource owners or the clients (or both) may not be honest. Our model introduces a trusted third party, referred to as “Grid Manager”. We describe in details the role of the Grid Manager and argue the advantages of our proposal with respect to the current state-of-the art.
Unable to display preview. Download preview PDF.
- 1.Foster, I., Kesselman, C., Nick, J., Tuecke, S.: The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration. In: Open Grid Service Infrastructure WG, Global Grid Forum (2002)Google Scholar
- 2.Beardsmore, A.: Grid Service Accounting Extensions (GSAX), http://www.doc.ic.ac.uk/sjn5/GGF/ggf-rus-gsax-01.pdf
- 3.Grid Economic Services Architecture, GESA (2003), http://www.doc.ic.ac.uk/sjn5/GGF/draft-ggf-gesa-services-1.pdf
- 4.Hazlewood, V., Bean, R., Yoshimot, K.: SNUPI: A grid accounting and performance system employing portal services and RDBMS back-end. In: The 5th LCI International Conference on Linux Clusters: The HPC Revolution, pp. 18–20 (2004)Google Scholar
- 5.Barmouta, A., Buyya, R.: GridBank: A Grid Accounting Service Architecture (GASA) for Distribuited System Sharing and Integration. In: The 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), pp. 22–26 (2003)Google Scholar
- 7.Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations Among Notions of Security for Public-Key Encryption Schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26–45. Springer, Heidelberg (1998)Google Scholar
- 9.Bellare, M., Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: ACM Conference on Computer and Communications Security, pp. 62–73 (1993)Google Scholar
- 10.Housley, R., Ford, W., Polk, W., Solo, D.: Internet X509 Public Key Infrastructure: Certificate and CRL Profile. Network Working Group, RFC 3280 (2002)Google Scholar