Trust Management in Grid-Trust Assessment and Trust Degree Calculation of a Resource—A Novel Approach


Grid Computing is concerned with the sharing and coordinated use of diverse resources in distributed Virtual Organizations. This introduces various challenging security issues. Among these trusting, the resources to be shared and coordinated with the dynamic and multi-institutional virtual organization environment becomes a challenging security issue. In this paper, an approach for trust assessment and trust degree calculation using subjective logic is suggested to allocate the Data Grid or Computational Grid user a reliable, trusted resource for maintaining the integrity of the data with fast response and accurate results. The suggested approach is explained using an example scenario and also from the simulation results. It is observed that there is an increase in the resource utilization of a trusted resource in contrast to the resource which is not trusted.

Share and Cite:

Anitha, A. (2015) Trust Management in Grid-Trust Assessment and Trust Degree Calculation of a Resource—A Novel Approach. Journal of Computer and Communications, 3, 34-41. doi: 10.4236/jcc.2015.36005.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] Foster, I., Siebenlist, F., Tereche, S. and Welch, V. (2002) Security and Certification Issues in Grid Computing. Argonne National Laboratory, University of Chicago, Chicago.
[2] Welch, V., Siebenlist, F., Foster, I., et al. (2006) Security for Grid Services. Argonne National Laboratory, University of Chicago, Chicago.
[3] Anitha, A. and Mujumdar, C. (2013) Hybrid Security Techniques for Grid/Cloud Computing Environment Using Identity Based Cryptography Advances. International Journal of Computers, Electrical and Advanced Communications Engineering, 2,
[4] Foster, I., Kesselman, K. and Tzudik, G. (1998) A Security Architecture for Computational Grids. Proceedings of the 5th ACM Conference on Computer and Communication Security, San Francisco, 83-92.
[5] Grimshaw, A.S., Humphrey, A.S. and Natrajan, A. (2004) A Phylosophical and Technical Comparison of Legion and Globus. IBM Journal of Research and Development, 48, 233-254.
[6] Cody, E., Sharman, R., Atkar, N., Rao, R.H. and Upadhyay, S. (2008) Security in Grid Computing: A Review and Synthesis. Decision Support Systems, 44, 749-764.
[7] Kamvar, S.D., Schlosser, M.T. and Molina, H.G. (2003) The Eigen Trust Algorithm for Reputation Management in P2P Networks. Proceedings of the 12th International World Wide Web Conference, Budapest, 20-24 May 2003, 12 p.
[8] Roxburgh, A., Pawlikowski, K. and McNickle, D.C. (2004) Grid Computing: the Current State and Future Trends (in General and from the University of Canterbury’s Perspective), University of Canterbury, Christchurch.
[9] Wolski, R., Brevik, J., Krintz, C., Obertelli, G., Spring, N. and Su, A. (1999) Running Every Ware on the Computational Grid. Proceedings of the 1999 ACM/IEEE conference on Supercomputing, Article No. 6, ISBN: 1-58113-091-0.
[10] Krauter, K., Buyya, R. and Maheswaran, M. (2001) A taxonomy and Survey of Grid Resource Management Systems for Distributed Computing. Software: Practical Experience, 32, 135-164.
[11] Mattmann, C.A., Garcia, J., Krka, I., Popescu, D. and Medvidovic, N. (2015) Revisiting the Anatomy and Physiology of the Grid. Journal of Grid Computing, 13, 19-34.
[12] Srinivasan, R. and Srivaramangai, P. (2010) A Comprehensive Trust Model for Improved Reliability in Grid. International Journal of Computer Application, 5, 1-4.
[13] Meng, W., Xia, H. and Song, H. (2009) A Dynamic Trust Model Based on Recommendation Credibility in Grid Domain. International Conference CiSE, Wuhan, 11-13 December 2009, 1-4.
[14] Farouk, A., Fouad, M.M. and Abdelhafez, A.A. (2014) Cross Domain Identity Trust Management for Grid Computing. International Journal of Security, Privacy and Trust Management, 3, 11-21.
[15] Ashrafijoo, B., Navin, A.H., Mir Nia, M.K. and Abedini, S. (2010) Trust Management in Grid Computing Systems Based on Probability Theory. 2nd International Conference on Educational Technology and Computer (ICETC), 4, 316-320.
[16] Anderson, D.P., Cobb, J., Korpela, E., Lebofsky, M. and Werthimer, D. (2002) Seti@home: An Experiment in Public-Resource Computing. Communications of the ACM, 45, 56-61.
[17] Gong, L. (1997) Java Security: Present and Near Future. IEEE Micro, 17, 14-19.

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.