ACM SIGAda Ada Letters
A Community Authorization Service for Group Collaboration
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Intrusion detection techniques for mobile wireless networks
Wireless Networks
Certificate-based authorization policy in a PKI environment
ACM Transactions on Information and System Security (TISSEC)
The PRIMA System for Privilege Management, Authorization and Enforcement in Grid Environments
GRID '03 Proceedings of the 4th International Workshop on Grid Computing
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Result Verification and Trust-Based Scheduling in Peer-to-Peer Grids
P2P '05 Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing
Security Issues in On-Demand Grid and Cluster Computing
CCGRID '06 Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid
Certificate-based access control for widely distributed resources
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Incremental Trust in Grid Computing
CCGRID '07 Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid
Ad Hoc Grid Security Infrastructure
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
A Monte Carlo framework to evaluate context based security policies in pervasive mobile environments
MobiDE '07 Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access
Toward a Usage-Based Security Framework for Collaborative Computing Systems
ACM Transactions on Information and System Security (TISSEC)
Security in grid computing: A review and synthesis
Decision Support Systems
A trust model for distributed systems based on reputation
International Journal of Web and Grid Services
Proceedings of the 1st international conference on Autonomic computing and communication systems
A toolkit for modelling and simulating data Grids: an extension to GridSim
Concurrency and Computation: Practice & Experience
Performance evaluation of XACML PDP implementations
Proceedings of the 2008 ACM workshop on Secure web services
Secure on-demand grid computing
Future Generation Computer Systems
Secure Grid Micro-Workflows Using Virtual Workspaces
SEAA '08 Proceedings of the 2008 34th Euromicro Conference Software Engineering and Advanced Applications
A trust degree based access control in grid environments
Information Sciences: an International Journal
SIGMA System: A Multi-OS Environment for Embedded Systems
Journal of Signal Processing Systems
The Journal of Supercomputing
Virtual machine monitor-based lightweight intrusion detection
ACM SIGOPS Operating Systems Review
GUTS: a framework for adaptive and configureable grid user trust service
STM'10 Proceedings of the 6th international conference on Security and trust management
Shibboleth and community authorization services: enabling role-based grid access
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part II
Review: Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
Journal of Network and Computer Applications
IEEE Communications Surveys & Tutorials
Hi-index | 0.00 |
In ad hoc grid environments, resources are not always available since nodes can spontaneously connect and disconnect at any time. Thus, these environments demand the correct execution of tasks to guarantee good performance. However, there are malicious users that affect the normal operation of these grids. These users modify tasks results and even cheat security mechanisms. Therefore, to assure high performance in these grid computing scenarios, it is essential to use punishment procedures based on trust models. These solutions have been used in wireless ad hoc networks, but not in the context of ad hoc grid computing. Thus, in this paper, we first present an analysis of mathematical trust models in ad hoc grid scenarios, using different ways to treat detection information passed on by other nodes. Then, we provide a comparison and a performance evaluation of these models using a grid simulator platform. Besides that, we choose the most accurate trust model among the evaluated ones to propose RETENTION: a reactive trust-based mechanism to detect and punish malicious nodes in ad hoc grid environments. Simulation results demonstrate the effectiveness of the proposed approach in detecting and punishing up to 100% of malicious nodes without generating false-positives. The results can be a valuable tool for network designers in planning trust models in ad hoc grid network deployments.