Practical forward secure group signature schemes
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Professional Java Security
Peer-to-Peer: Harnessing the Power of Disruptive Technologies
Peer-to-Peer: Harnessing the Power of Disruptive Technologies
SETI@home: an experiment in public-resource computing
Communications of the ACM
A reputation-based approach for choosing reliable resources in peer-to-peer networks
Proceedings of the 9th ACM conference on Computer and communications security
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Experimental Assessment of Workstation Failures and Their Impact on Checkpointing Systems
FTCS '98 Proceedings of the The Twenty-Eighth Annual International Symposium on Fault-Tolerant Computing
SHARP: an architecture for secure resource peering
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
PROMISE: peer-to-peer media streaming using CollectCast
MULTIMEDIA '03 Proceedings of the eleventh ACM international conference on Multimedia
SLIC: A Selfish Link-Based Incentive Mechanism for Unstructured Peer-to-Peer Networks
ICDCS '04 Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)
Robust incentive techniques for peer-to-peer networks
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
Towards a Quality of Service Aware Public Computing Utility
NCA '04 Proceedings of the Network Computing and Applications, Third IEEE International Symposium
Discouraging Free Riding in a Peer-to-Peer CPU-Sharing Grid
HPDC '04 Proceedings of the 13th IEEE International Symposium on High Performance Distributed Computing
Journal of Parallel and Distributed Computing
Proceedings of the 5th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
An adaptive computational trust model for mobile ad hoc networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Hi-index | 0.00 |
This paper presents a hierarchical (two-layered) trust management framework for very large scale distributed computing utilities where public resources provide majority of the resource capacity. The dynamic nature of these utility networks introduce challenging management and security issues due to behavior turnabout, maliciousness and diverse policy enforcement. The trust management approach offers interesting answers to such issues. In our framework, the lower layer computes local reputation for peers within their domain based on individual contribution, while the upper layer combines the local reputation with that of its domain's (as perceived by other domains) to compute the peer's global trust. Simulation results show that the hierarchical scheme is more scalable, highly robust in hostile conditions and capable of creating rapid trust estimates. Features of the framework include: (a) ability to carry forward local behavior trends, (b) autonomous domain-based policing, (c) high cohesiveness with the resource management system, and (d) securely exposing the trust evaluation operations to peers (i.e., the subjects of the evaluation process). A detailed analysis of the threats/attacks that the framework could be subjected is presented along with countermeasures against the attacks.