Two Risk-Aware Resource Brokering Strategies in Grid Computing: Broker-Driven vs. User-Driven Methods

Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 54)


Grid computing evolves toward an open computing environment, which is characterized by highly diversified resource providers and systems. As the control of each computing resource becomes difficult, the security of users’ job is often threatened by various risks occurred at individual resources in the network. This paper proposes two risk-aware resource brokering strategies: self-insurance and risk-performance preference specification. The former is a broker-driven method and the latter a user-driven method. Two mechanisms are analyzed through simulations. The simulation results show that both methods are effective for increasing the market size and reducing risks, but the user-driven technique is more cost-efficient.


Grid computing Risk management Self-insurance Risk-performance preference specification 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Kenyon, C., Cheliotis, G.: Architecture requirements for commercializing Grid resources. In: Proceedings of the 11th IEEE International Symposium on High Performance Distributed Computing, pp. 215–224 (2002)Google Scholar
  2. 2.
    Kenyon, C., Cheliotis, G.: Grid resource commercialization: economic engineering and delivery scenarios. In: Grid resource management: state of the art and future trends, pp. 465–478. Kluwer Academic Publishers, Dordrecht (2004)Google Scholar
  3. 3.
    Foster, I., Kesselman, C., Tuecke, S.: The Anatomy of the Grid: Enabling Scalable Virtual Organizations. International Journal of High Performance Computing Applications 15, 200–222 (2001)CrossRefGoogle Scholar
  4. 4.
    Minoli, D.: A Networking Approach to Grid Computing. Wiley-Interscience, Hoboken (2004)CrossRefGoogle Scholar
  5. 5.
    Thanos, G., Courcoubetis, C., Stamoulis, G.: Adopting the Grid for Business Purposes: The Main Objectives and the Associated Economic Issues. In: Veit, D.J., Altmann, J. (eds.) GECON 2007. LNCS, vol. 4685, pp. 1–15. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  6. 6.
    Domingues, P., Sousa, B., Moura Silva, L.: Sabotage-tolerance and trust management in desktop grid computing. Future Generation Computer Systems 23, 904–912 (2007)CrossRefGoogle Scholar
  7. 7.
    Plaszczak, P., Wellner, R.: Grid computing: the savvy manager’s guide. Elsevier/Morgan Kaufmann, San Francisco (2005)Google Scholar
  8. 8.
    Song, S., Kai, H., Yu-Kwong, K.: Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling. IEEE Transactions on Computers 55, 703–719 (2006)CrossRefGoogle Scholar
  9. 9.
    Boden, T.: The Grid Enterprise — Structuring the Agile Business of the Future. BT Technology Journal 22, 107–117 (2004)CrossRefGoogle Scholar
  10. 10.
    Bodin, L.D., Gordon, L.A., Loeb, M.P.: Information security and risk management. Commun. ACM 51, 64–68 (2008)CrossRefGoogle Scholar
  11. 11.
    Bohme, R., Kataria, G.: Models and Measures for Correlation in Cyber-Insurance. In: Workshop on the Economics of Information Security (2006)Google Scholar
  12. 12.
    Gordon, L.A., Loeb, M.P., Sohail, T.: A framework for using insurance for cyber-risk management. Commun. ACM 46, 81–85 (2003)CrossRefGoogle Scholar
  13. 13.
    Chen, P.-Y., Kataria, G., Krishnan, R.: Software diversity for information security. In: Workshop on the Economics of Information Security (WEIS), Harvard University, Cambridge, MA (2005)Google Scholar
  14. 14.
    Gordon, L.A., Loeb, M.P.: The economics of information security investment. ACM Trans. Inf. Syst. Secur. 5, 438–457 (2002)CrossRefGoogle Scholar
  15. 15.
    Kesan, J., Majuca, R., Yurcik, W.: The Economic Case for Cyberinsurance. University of Illinois College of Law uiuclwps-1001 (2004)Google Scholar
  16. 16.
    Ogut, H., Menon, N., Raghunathan, S.: Cyber Insurance and IT Security Investment: Impact of Interdependent Risk. In: Workshop on the Economics of Information Security (2005)Google Scholar
  17. 17.
    Hwang, S., Kesselman, C.: A Flexible Framework for Fault Tolerance in the Grid. Journal of Grid Computing 1, 251–272 (2003)zbMATHCrossRefGoogle Scholar
  18. 18.
    McGough, A.S., Afzal, A., Darlington, J., Furmento, N., Mayer, A., Young, L.: Making the Grid Predictable through Reservations and Performance Modeling. The Computer Journal 48, 358–368 (2005)CrossRefGoogle Scholar
  19. 19.
    Battre, D., Djemame, K., Kao, O., Voss, K.: Gaining users’ trust by publishing failure probabilities. In: Third International Conference on Security and Privacy in Communications Networks and the Workshops (SecureComm 2007), pp. 193–198 (2007)Google Scholar
  20. 20.
    Kleban, S.D., Clearwater, S.H.: Computation-at-risk: assessing job portfolio management risk on clusters. In: Proceedings of the 18th International Parallel and Distributed Processing Symposium, p. 254 (2004)Google Scholar
  21. 21.
    Yeo, C.S., Buyya, R.: Integrated Risk Analysis for a Commercial Computing Service. In: IEEE International Parallel and Distributed Processing Symposium (IPDPS 2007), pp. 1–10 (2007)Google Scholar
  22. 22.
    Huang, Z., Qiu, Y.: Resource trading using cognitive agents: A hybrid perspective and its simulation. Future Generation Computer Systems 23, 837–845 (2007)CrossRefGoogle Scholar
  23. 23.
    Tobias, R., Hofmann, C.: Evaluation of free Java-libraries for social-scientific agent based simulation. Journal of Artificial Societies and Social Simulation 7 (2004)Google Scholar
  24. 24.
    Tesfatsion, L.: Agent-Based Computational Economics: A Constructive Approach to Economic Theory. In: Tesfatsion, L., Judd, K.L. (eds.) Handbook of Computational Economics, vol. 2, ch. 16, pp. 831–880. Elsevier, Amsterdam (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  1. 1.Technology Management, Economics and Policy ProgramSeoul National UniversityKorea

Personalised recommendations