Skip to main content
Log in

A study on impact of untrustworthy and older recommendations over T-Grid computational model

  • Original Article
  • Published:
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

Trust can be either direct or indirect based on the direct impression established by the recipient of the services or feedback given by recommenders over the service provider respectively. However, untrustworthy recommendations may lead to misuse of valuable resources, especially in grid like distributed environment where continuous dynamic sharing of the resources is involved. Further, a genuine recommendation may become older over a period of time in a trust database and using such values in trust evaluation may lead to misinterpreted estimates of the trust. Hence, eliminating such untrustworthy and older recommendations from the interactions can construct a robust and reliable grid computing environment. Proposed T-Grid model eliminates untrustworthy recommendations from the grid while considering parameters like credibility and trust decay of a recommending entity. This paper analyzes the performance evaluation of proposed T-Grid model in terms of trustworthiness of the resource providers, effect of decay and utilization ratio of the resources. Results of the analysis are produced.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  • Abdi H (2007) Kendall rank correlation. In: Salkind NJ (ed) Encyclopedia of Measurement and Statistics. Sage, Thousand Oaks

    Google Scholar 

  • Ashrafijoo B, Navin AH, Mir Nia M-K, Abedini S, Azari N (2010) Trust management in grid computing systems based on probability theory. 2nd international conference on education technology and computer (ICETC), 4(4) pp. 316–320, 22–24 June 2010

  • Bawa RK, Sharma G (2012) Reliable resource selection in grid environment. Int J Grid Comput Appl 3(1):1516

    Google Scholar 

  • Bhanwar S, Bawa S (2009) Establishing and evaluating trust in a grid environment, 10th international symposium ISPAN’09, pp. 674–678

  • Bendahmane A, Essaaidi M, Moussaoui AE, Younes A (2011) Tolerating malicious resources to ensure safe computations in grid systems. International conference on multimedia computing and systems (ICMCS), 1(6) pp. 7–9

  • Chadwick D (2005) Authorization in grid computing, information security Technical Report, Elsevier, 10(1) pp. 33–40

  • Das A, Islam MM (2012) Secured trust: a dynamic trust computation model for secured communication in multiagent systems. IEEE Trans Dependable Secur Comput 9(2):261–274

    Article  Google Scholar 

  • IBM Red Book (2004) Fundamentals of grid computing, REDP-3613-00

  • Kaur D, SenGupta J (2012) P2P trust and reputation model for securing grid resource management, international conference on advances in engineering, science and management (ICAESM), pp. 524–529

  • Liao H, Wang Q, Li G (2009) A fuzzy logic-based trust model in grid. International conference on networks security, wireless communications and trusted computing, NSWCTC ‘09, pp. 608–614

  • Lin Y, Luo S, Gao Z (2009) A recommender trust model based behavior in grid. Second international conference FITME ‘09, pp. 568–571

  • Mashayekhy L, Grosu D (2012) A reputation-based mechanism for dynamic virtual organization formation in grids. 41st international conference on parallel processing (ICPP) pp. 108–117

  • Merriam-Webster’s Collegiate Dictionary (2005)

  • Min Y, Weifeng S, Jiong Z (2010) Trust evaluation model with stakeholder-centric in grids. International conference on intelligent computation technology and automation (ICICTA), pp. 1099–1101, 11–12 May 2010

  • Mu P, Chang M (2009) Time-decay-based reputation method for buyers making decisions in online shopping. The 9th international conference on electronic business, Macau, pp. 280–285, Nov 30–Dec 4 2009

  • Nagarathna N, Indiramma M (2012) Recommendation framework for service-oriented grid. Fourth international conference on advanced computing (ICoAC), 1(6) pp. 13–15

  • Ruizhong D, Xiaoxue M, Zixian W, Fang Z (2010) A grid reputation model based on service quality. Second international conference on networks security wireless communications and trusted computing (NSWCTC), pp. 206–209, 24–25 April 2010

  • Srinivasan R, Srivaramangai P (2010) A comprehensive trust model for improved reliability in grid. Int J Comput Appl 5(7):1–4

    Google Scholar 

  • Suresh Kumar P, Ramachandram S (2014) User satisfaction based quantification of direct trust in T-Grid computational model. IEEE 2014 international conference on computer, communication, and control technology (I4CT-2014), pp. 438–442, Sept 2014

  • Suresh Kumar P, Sateesh Kumar P, Ramachandram S (2011) Recent trust models in grid. Int J Theor Appl Inf Technol 26(1):64–68

    Google Scholar 

  • Tian J, Yuan P, Lu Y (2009) Security for resource allocation based on trust and reputation in computational economy model for grid. Fourth international conference on frontier of computer science and technology FCST ‘09, pp. 339–345, 17–19 Dec 2009

  • Viduto V, Townend P, Xu J, Djemame K, Bochenkov A (2013) A graph-based approach to address trust and reputation in ubiquitous networks. IEEE 7th international symposium on service oriented system engineering (SOSE) pp. 397–402

  • Vijayakumar V, WahidhaBanu RSD (2008) Trust and reputation aware security for resource selection in grid computing. 2008 international conference on security technology, pp. 121–124

  • Vivekananth P (2010) A behavior based trust model for grid security. Int J Comput Appl 5(6):1–3.

    Google Scholar 

  • Wang K, Li L, Hausheer D, Liu Z, Li W, Shi D, He G, Stiller B (2010) A trust-incentive-based combinatorial double auction algorithm, 2010 IEEE network operations and management symposium (NOMS), pp. 209–215, 19–23 April 2010

  • Ying G, Jiang Z (2010) A layered trust model based on behavior in service grid. 2nd international conference ICACC, pp. 511–515

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. Suresh Kumar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Suresh Kumar, P., Ramachandram, S. A study on impact of untrustworthy and older recommendations over T-Grid computational model. Int J Syst Assur Eng Manag 9, 646–656 (2018). https://doi.org/10.1007/s13198-014-0329-z

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13198-014-0329-z

Keywords

Navigation