Security for Resource Selection in Grid Computing FULL REPORT
#1

Submitted By
N.SriVani

[attachment=13928]
[attachment=13929]
Abstract:
By properly authenticating users and hosts and in the interactions between them, most grid implementations focus their safety concerns. Grid applications utilize high performance distributed resources similar to high performance systems, networks, databases, etc. Resources and security guarantee are the two fundamental requirements in Grid applications. Most grid computing environments spotlight their security concerns in proper authenticating users and hosts and in the communications between them. To automatically and clearly ensure the fulfillment, the effective and efficient exploitation of Grid computing facilities requires advanced and secured resource management systems. The scale of resources and the strangeness of entities cause difficulties in the process of resource selection. Since a high-efficient society cannot go with resource selection. Since a high-efficient society cannot go with a high trustworthy social relationship, efficient resource sharing cannot be attained in Grid without certain trust relationship core. The experimental setup consists of ten grid entities and a Grid Organization Manager. Computational Grids are quickly rising as a practical means by which to execute new science and develop new applications. The effective and efficient explosion of Grid computing facilities needs highly advanced and protected resource management systems. Efficient resource sharing and accessing cannot go without the assurance of high trust worthies. Reputation mechanisms provide a way for building trust through social control using community based feedback about previous experiences. Our method is demonstrated effective in selecting secured entity for job execution from the available ones. Our scheme scales well with both number of jobs and number of Grid site
1. Introduction
Increased network bandwidth, more powerful computers, and the acceptance of the Internet have motivated the constant requirement for latest and improved ways to compute. In the late 1990’s, a complex computation environment, Grid computing, had come out. The aspiration to share processing resources between many organizations to resolve large scale problems has provoked computational grids. In the recent years, grid computing is rising as a viable paradigm to convince the continuous growth of computation power requirement, which frequently can not be fulfilled exploiting the internal resources of a single organization.
Grid computing is a collection of autonomous and distributed resources available over virtual organizations, and collaborate works with effective, efficient and reliable way. The term “Grid” refers to systems and applications that integrate and manage resources and services distributed across multiple control domains. The upcoming computational Grids offer a new platform for implementing large-scale resource intensive applications on a number of heterogeneous computing resources across political and administrative domains.
Grid applications utilize high performance distributed resources similar to high performance systems, networks, databases, etc. These have enabled via grid middleware for instance Globus , Gridbus. The resources in grid are dynamic. The resources of grid computing vary in level from a small number of large clusters (for example the TeraGrid ) to millions of PC-class machines (for example SETI@Home).
Developing a comprehensive set of mechanisms and policies for protecting the grid is most significant challenge for Grid computing questionably in many ways. At present, Grid security research and development turns around developing better solutions to take care of the following requirements: Authentication, Secure Communication, Effective Security Policies, Authorization, and Access Control.
Resources and security guarantee are the two fundamental requirements in Grid applications . Coordinated resource sharing and problem resolving in dynamic, multi- institutional virtual organizations are the actual and specific problems which underlies the grid concept. Once infected shared grid resources through malicious codes planted by intruders possibly will spoil other applications running on the same Grid platform.
The concerned sharing is not primarily file exchange but rather direct access to computers, software, data and other resources since it is required by a range of collaborative problem-solving and resource-brokering strategies emerging in industry, science and engineering. The resource management in Grid systems is challenging due to: (a) geographical distribution of resources, (b) resource heterogeneity, © autonomously administered Grid domains having their own resource policies and practices and (d) Grid domains using different access and cost models .
At present, security is put up into grid toolkits (e.g. the Globus toolkit ) used at the provider sites (parties that offer resources for use in the grid). The toolkit handles secure channels, authentication, unsupervised login, delegation, and resource usage . These mechanisms generally do not concern themselves with protecting the grid user (the person or entity desires to utilize resources). Without verifying the justification of the trust, the user is compelled to trust the provider .
Users are able to submit jobs to remote resources and typically have no explicit control over the resources themselves. Therefore, mutually users and resources can be viewed as independent agents, having control of their own behavior. Since an individual cannot forecast the response of another to changing situations, this autonomy provides rise to inherent insecurity, . The Grid service providers must guarantee the users with definite security, privacy protection, and dependable accessibility of all Grid- enabling platforms .
Most grid computing environments spotlight their security concerns in properly authenticating users and hosts and in the communications between them. To automatically and clearly ensure the fulfillment, the effective and efficient exploitation of Grid computing facilities requires advanced and secured resource management systems. This fulfillment is not only for functional requirements but for non-functional ones as well.
The wide range of selection and the high degree of strangeness leads to the problem in secured selection of the resources in grid. Without the assurance of a higher degree of trust relationship, competent resource allocation and utilization can not be attained. In recent times, with larger applications in e- commerce and on-line communities, reputation mechanisms have become one of the most important techniques underpinning the distributed application and system safety for its better scalability and flexibility.
This is the enhanced version of our previous work with detailed analysis of the performance . The most important target of this research is to develop a solution that could afford trust and reputation aware security for resource selection in Grid sites for scheduling large number of independent and indivisible jobs.
The proposed approach aims the schedule of incoming jobs to available resource sites based on the Trust Factor value. The Trust Factor (TF) value of each resource site has estimated by its self-protection capability and reputation weightage acquired through the feedback from user community on its past behavior. The self-protection capability of a site includes its ability to detect intrusions, viruses, unauthorized access and secured file storage and job completing abilities. Reputation mechanisms offer a way for building trust through social control by using community based feedback about past experiences of entities. Our approach is meant to enforce security in Grids with security-assured resource allocation.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: security issues in grid computing, seminar report on resource allocation in grid computing, latest grid computing security issues, grid computing report doc, ppt for grid computing ppt for grid computing of topic grid security, seminar report on grid computing pdf, security issues in grid computing ppt,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  SAMBA SERVER ADMINISTRATION full report project report tiger 3 4,780 17-01-2018, 05:40 PM
Last Post: AustinnuAke
  air ticket reservation system full report project report tiger 16 46,954 08-01-2018, 02:33 PM
Last Post: RaymondGom
  Platform Autonomous Custom Scalable Service using Service Oriented Cloud Computing Ar 1 1,070 15-02-2017, 04:39 PM
Last Post: jaseela123d
  WEB SERVICE SELECTION BASED ON RANKING OF QOS USING ASSOCIATIVE CLASSIFICATION 1 940 15-02-2017, 04:13 PM
Last Post: jaseela123d
  Cloud Computing with Service Oriented Architecture in Business Applications 1 925 15-02-2017, 11:55 AM
Last Post: jaseela123d
  Cloud Computing Security: From Single to Multi-Clouds 1 844 14-02-2017, 04:56 PM
Last Post: jaseela123d
  SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-He 1 924 14-02-2017, 03:49 PM
Last Post: jaseela123d
  Energy-Aware Autonomic Resource Allocation in Multi tier Virtualized Environments 1 774 14-02-2017, 02:13 PM
Last Post: jaseela123d
  An Efficient Algorithm for Mining Frequent Patterns full report project topics 3 4,806 01-10-2016, 10:02 AM
Last Post: Guest
  online examination full report project report tiger 14 42,960 03-09-2016, 11:20 AM
Last Post: jaseela123d

Forum Jump: