Abstract
Trust can be either direct or indirect based on the direct impression established by the recipient of the services or feedback given by recommenders over the service provider respectively. However, untrustworthy recommendations may lead to misuse of valuable resources, especially in grid like distributed environment where continuous dynamic sharing of the resources is involved. Further, a genuine recommendation may become older over a period of time in a trust database and using such values in trust evaluation may lead to misinterpreted estimates of the trust. Hence, eliminating such untrustworthy and older recommendations from the interactions can construct a robust and reliable grid computing environment. Proposed T-Grid model eliminates untrustworthy recommendations from the grid while considering parameters like credibility and trust decay of a recommending entity. This paper analyzes the performance evaluation of proposed T-Grid model in terms of trustworthiness of the resource providers, effect of decay and utilization ratio of the resources. Results of the analysis are produced.
Similar content being viewed by others
References
Abdi H (2007) Kendall rank correlation. In: Salkind NJ (ed) Encyclopedia of Measurement and Statistics. Sage, Thousand Oaks
Ashrafijoo B, Navin AH, Mir Nia M-K, Abedini S, Azari N (2010) Trust management in grid computing systems based on probability theory. 2nd international conference on education technology and computer (ICETC), 4(4) pp. 316–320, 22–24 June 2010
Bawa RK, Sharma G (2012) Reliable resource selection in grid environment. Int J Grid Comput Appl 3(1):1516
Bhanwar S, Bawa S (2009) Establishing and evaluating trust in a grid environment, 10th international symposium ISPAN’09, pp. 674–678
Bendahmane A, Essaaidi M, Moussaoui AE, Younes A (2011) Tolerating malicious resources to ensure safe computations in grid systems. International conference on multimedia computing and systems (ICMCS), 1(6) pp. 7–9
Chadwick D (2005) Authorization in grid computing, information security Technical Report, Elsevier, 10(1) pp. 33–40
Das A, Islam MM (2012) Secured trust: a dynamic trust computation model for secured communication in multiagent systems. IEEE Trans Dependable Secur Comput 9(2):261–274
IBM Red Book (2004) Fundamentals of grid computing, REDP-3613-00
Kaur D, SenGupta J (2012) P2P trust and reputation model for securing grid resource management, international conference on advances in engineering, science and management (ICAESM), pp. 524–529
Liao H, Wang Q, Li G (2009) A fuzzy logic-based trust model in grid. International conference on networks security, wireless communications and trusted computing, NSWCTC ‘09, pp. 608–614
Lin Y, Luo S, Gao Z (2009) A recommender trust model based behavior in grid. Second international conference FITME ‘09, pp. 568–571
Mashayekhy L, Grosu D (2012) A reputation-based mechanism for dynamic virtual organization formation in grids. 41st international conference on parallel processing (ICPP) pp. 108–117
Merriam-Webster’s Collegiate Dictionary (2005)
Min Y, Weifeng S, Jiong Z (2010) Trust evaluation model with stakeholder-centric in grids. International conference on intelligent computation technology and automation (ICICTA), pp. 1099–1101, 11–12 May 2010
Mu P, Chang M (2009) Time-decay-based reputation method for buyers making decisions in online shopping. The 9th international conference on electronic business, Macau, pp. 280–285, Nov 30–Dec 4 2009
Nagarathna N, Indiramma M (2012) Recommendation framework for service-oriented grid. Fourth international conference on advanced computing (ICoAC), 1(6) pp. 13–15
Ruizhong D, Xiaoxue M, Zixian W, Fang Z (2010) A grid reputation model based on service quality. Second international conference on networks security wireless communications and trusted computing (NSWCTC), pp. 206–209, 24–25 April 2010
Srinivasan R, Srivaramangai P (2010) A comprehensive trust model for improved reliability in grid. Int J Comput Appl 5(7):1–4
Suresh Kumar P, Ramachandram S (2014) User satisfaction based quantification of direct trust in T-Grid computational model. IEEE 2014 international conference on computer, communication, and control technology (I4CT-2014), pp. 438–442, Sept 2014
Suresh Kumar P, Sateesh Kumar P, Ramachandram S (2011) Recent trust models in grid. Int J Theor Appl Inf Technol 26(1):64–68
Tian J, Yuan P, Lu Y (2009) Security for resource allocation based on trust and reputation in computational economy model for grid. Fourth international conference on frontier of computer science and technology FCST ‘09, pp. 339–345, 17–19 Dec 2009
Viduto V, Townend P, Xu J, Djemame K, Bochenkov A (2013) A graph-based approach to address trust and reputation in ubiquitous networks. IEEE 7th international symposium on service oriented system engineering (SOSE) pp. 397–402
Vijayakumar V, WahidhaBanu RSD (2008) Trust and reputation aware security for resource selection in grid computing. 2008 international conference on security technology, pp. 121–124
Vivekananth P (2010) A behavior based trust model for grid security. Int J Comput Appl 5(6):1–3.
Wang K, Li L, Hausheer D, Liu Z, Li W, Shi D, He G, Stiller B (2010) A trust-incentive-based combinatorial double auction algorithm, 2010 IEEE network operations and management symposium (NOMS), pp. 209–215, 19–23 April 2010
Ying G, Jiang Z (2010) A layered trust model based on behavior in service grid. 2nd international conference ICACC, pp. 511–515
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Suresh Kumar, P., Ramachandram, S. A study on impact of untrustworthy and older recommendations over T-Grid computational model. Int J Syst Assur Eng Manag 9, 646–656 (2018). https://doi.org/10.1007/s13198-014-0329-z
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13198-014-0329-z