[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Fuzzy-based trusted security for mobile grid systems

Published: 01 January 2018 Publication History

Abstract

In mobile grid system, the main factor to be considered while deploying in real world application is security. Otherwise, the framework would be incomplete and impractical. In order to provide full security, successful job execution and high resource availability, in this paper, we propose to design a fuzzy-based trusted security for mobile grid systems. In this technique, the trust index value of each node is estimated using fuzzy logic. Here the metrics grid residence time, reputation and degree of maliciousness are considered as input for the fuzzy logic and the trust index value is determined as output. Based on the trust index, GS allocates the grid node when it receives the service request. Also, as the trust index is calculated and updated by the GS, the malicious nodes cannot modify or destroy the values. By simulation results, we show that the proposed technique offers high security and high resource availability.

References

[1]
Ahua, S.P. and Myers, J.R. (2006) 'Survey on wireless grid computing', The Journal of Supercomputing, Vol. 37, No. 1, pp.3-21.
[2]
Azzedin, F. and Maheswaran, M. (2002) 'Towards trust-aware resource management in grid computing systems', in Cluster Computing and the Grid, 2nd IEEE/ACM International Symposium on 2002, May 21, pp.452-452, IEEE.
[3]
Cheng, R., Zhang, Y., Bertino, E. and Prabhakar, S. (2006) 'Preserving user location privacy in mobile data management infrastructures', in International Workshop on Privacy Enhancing Technologies, Springer, Berlin, Heidelberg, June, pp.393-412.
[4]
Farooq, U., Mahfooz, S. and Khalil, W. (2006) 'An efficient resource prediction model for mobile grid environments', in Proceeding of 1st Annual Post Graduate Symposium on the Convergence of Telecommunication Networking and Broadcasting, IEE/EPSRC, Liverpool John Moores University, UK, June.
[5]
Heien, E.M., Anderson, D.P. and Hagihara, K. (2009) 'Computing low latency batches with unreliable workers in volunteer computing environments', Journal of Grid Computing, 7(4), pp.501-518.
[6]
Hwang, K. and Tanachaiwiwat, S. (2003) 'Trust models and NetShield architecture for securing grid computing', Journal of Grid Computing.
[7]
Katsaros, K. and Polyzos, G.C. (2007) 'Towards the realization of a mobilegrid', in Proceedings of the ACM CoNEXT Conference, ACM, December 10, p.31.
[8]
Litke, A., Skoutas, D. and Varvarigou, T. (2004) 'Mobile grid computing: changes and challenges of resource management in a mobile grid environment', in 5th International Conference on Practical Aspects of Knowledge Management (PAKM 2004), December.
[9]
Ma, B., Sun, J. and Yu, C. (2006) 'Reputation-based trust model in grid security system', Journal of Communication and Control, Vol. 3, No. 8, pp.41-46.
[10]
Nishio, S. and Tsukamoto, M. (2002) 'Data management issues in mobile and peer-to-peer environments', Data & Knowledge Engineering, Vol. 41, No. 2, pp.183-204.
[11]
Parveen Begam, H. and Maluk Mohamed, M.A. (2012) 'Secured data management paradigm for mobile grid environment using surrogate objects', IEEE 13th International Conference on Mobile Data Management.
[12]
Rosado, D.G., Fernández-Medina, E. and López, J. (2011) 'Security services architecture for secure mobile grid systems', Journal of Systems Architecture, Vol. 57, No. 3, pp.240-258.
[13]
Rosado, D.G., Fernández-Medina, E., López, J. and Piattini, M. (2010) 'Analysis of secure mobile grid systems: a systematic approach', Information and Software Technology, Vol. 52, No. 5, pp.517-536.
[14]
Rosado, D.G., Fernández-Medina, E., López, J. and Piattini, M. (2009) 'Obtaining security requirements for a mobile grid system', International Journal of Grid and High Performance Computing (IJGHPC), p.247.
[15]
Song, S., Hwang, K. and Kwok, Y-K. (2005) 'Trusted grid computing with security binding and trust integration', Journal of Grid Computing, Vol. 3, Nos. 1-2, pp.53-73.
[16]
Vijayakumar, V. and Wahida Banu, R.S.D. (2008) 'Security for resource selection in grid computing based on trust and reputation responsiveness', International Journal of Computer Science and Network Security, November, Vol. 8, No. 11, pp.107-115.
[17]
Wong, S-W. and Ng, K-W. (2006) 'Security support for mobile grid services', International Journal of Web Services Practices, Vol. 2, Nos. 1-2, pp.75-82.

Cited By

View all
  • (2021)Fuzzy Logic in Surveillance Big Video Data AnalysisACM Computing Surveys10.1145/344469354:3(1-33)Online publication date: 21-May-2021

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image International Journal of Networking and Virtual Organisations
International Journal of Networking and Virtual Organisations  Volume 18, Issue 3
January 2018
82 pages
ISSN:1470-9503
EISSN:1741-5225
Issue’s Table of Contents

Publisher

Inderscience Publishers

Geneva 15, Switzerland

Publication History

Published: 01 January 2018

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Fuzzy Logic in Surveillance Big Video Data AnalysisACM Computing Surveys10.1145/344469354:3(1-33)Online publication date: 21-May-2021

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media