PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Security aspects in resource management systems in distributed computing environments

Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In many distributed computing systems, aspects related to security are getting more and more relevant. Security is ubiquitous and could not be treated as a separated problem or a challenge. In our opinion it should be considered in the context of resource management in distributed computing environments like Grids and Clouds, e.g. scheduled computations can be much delayed because of cyber-attacks, inefficient infrastructure or users valuable and sensitive data can be stolen even in the process of correct computation. To prevent such cases there is a need to introduce new evaluation metrics for resource management that will represent the level of security of computing resources and more broadly distributed computing infrastructures. In our approach, we have introduced a new metric called reputation, which simply determines the level of reliability of computing resources from the security perspective and could be taken into account during scheduling procedures. The new reputation metric is based on various relevant parameters regarding cyber-attacks (also energy attacks), administrative activities such as security updates, bug fixes and security patches. Moreover, we have conducted various computational experiments within the Grid Scheduling Simulator environment (GSSIM) inspired by real application scenarios. Finally, our experimental studies of new resource management approaches taking into account critical security aspects are also discussed in this paper.
Rocznik
Strony
299--313
Opis fizyczny
Bibliogr. 18 poz., fig., tab.
Twórcy
autor
  • Poznan Supercomputing and Networking Center, Poznań, Poland
autor
  • Poznan Supercomputing and Networking Center, Poznań, Poland
autor
  • Institute of Computing Science, Poznan University of Technology, Poznań, Poland
autor
  • Poznan Supercomputing and Networking Center, Poznań, Poland
autor
  • Institute of Computing Science, Poznan University of Technology, Poznań, Poland
Bibliografia
  • [1] Aberer K. and Despotovic Z., Managing Trust in a Peer-2-Peer Information System, in Proceedings of the Ninth International Conference on Information and Knowledge Management, 2001.
  • [2] Adamski M., Kulczewski M., Kurowski K., Nabrzyski J., Hume A.C., Security and performance enhancements to OGSA-DAI for Grid data virtualization, Concurrency and Computation Practice and Experience, vol. 19, no. 16, p. 2171-2182, November 2007.
  • [3] Alunkal B., Veljkovic I., von Laszewski G., and Amin K., Reputation-Based Grid Resource Selection, Proc. Workshop Adaptive Grid Middleware (AGridM '03), 2003.
  • [4] Bąk S., Krystek M., Kurowski K., Oleksiak A., Piątek W., Węglarz J., GSSIM - a tool for distributed computing experiments, Scientific Programming Journal, vol. 19, no. 4, p. 231-251, 2011.
  • [5] Delft University of Technology, Grid workloads archive, 2007, [Online]. Available: http://gwa.ewi.tudelft.nl/, [Accessed 2016].
  • [6] Feitelson D., Parallel workload archive, 2011, [Online]. Available: http://www.cs.huji.ac.il/labs/parallel/workload/ [Accessed 2014].
  • [7] Damiani E., di Vimercati S.D.C., Paraboschi S., Samarati P., and Violante F., A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks, Proc. Ninth ACM Conf. Computer and Comm. Security (CCS '02), p. 207-216, November 2002.
  • [8] Kamvar S., Schlosser M., and Garcia-Molina H., The EigenTrust Algorithm for Reputation Management in P2P Networks, Proc. 12th Int'l World Wide Web Conf. (WWW '03), 2003.
  • [9] Kurowski K., Oleksiak A., Piątek W., Węglarz J., Impact of Urgent Computing on Resource Management Policies, Schedules and Resources Utilization, In Procedia Computer Science, 9, p. 1713-1722. Elsevier, 2012.
  • [10] OGSA-DAI platform, 2013, [Online]. Available : http://www.ogsadai.org.uk, [Accessed 2016].
  • [11] Open Educational Resources K12 platform, [Online]. Available: http://www.epodreczniki.pl, [Accessed 2015].
  • [12] Resnick P., Zeckhauser R., Friedman E., and Kuwabara K., Reputation Systems, Communications of the ACM, vol. 43, no. 12, p. 45-48, 2000.
  • [13] Sonnek J., Chandra A. and Weissman J., Adaptive Reputation-Based Scheduling on Unreliable Distributed Infrastructures, IEEE Transactions on Parallel and Distributed Systems 2007.
  • [14] Sonnek J., Nathan M., Chandra A., and Weissman J., Reputation-Based Scheduling on Unreliable Distributed Infrastructures, Technical Report 05-036, Dept. Computer Science and Eng. (CSE), Univ. of Minnesota, November 2005.
  • [15] Wu Z., Xie M., and Wang H., Energy Attack on Server Systems, in Proceedings of USENIX WOOT’11.
  • [16] Wu Z., Xie M. and Wang H., On Energy Security of Server Systems, IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 6, p. 865-876, November 2012.
  • [17] Xu Z., Wang H., Xu Zichen, Wang X., Power Attack: An Increasing Threat to Data Centers, In Proc. of NDSS, vol. 14, 2014.
  • [18] Zhao R. and Hwang K., PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing, IEEE Trans. Parallel and Distributed Systems, vol. 18, no. 5, May 2007.
Uwagi
Opracowanie ze środków MNiSW w ramach umowy 812/P-DUN/2016 na działalność upowszechniającą naukę (zadania 2017).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-3bbc561d-eaf9-46ec-a72c-e4ef10d70f1f
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.