University of Westminster – www.cpc.wmin.ac.uk Y. Zetuny, G. Terstyanszky, S. Winter, P. Kacsuk Centre for Parallel Computing Cavendish School of Informatics.

Slides:



Advertisements
Similar presentations
Legacy code support for commercial production Grids G.Terstyanszky, T. Kiss, T. Delaitre, S. Winter School of Informatics, University.
Advertisements

Chapter 10: Execution Models Service-Oriented Computing: Semantics, Processes, Agents – Munindar P. Singh and Michael N. Huhns, Wiley, 2005.
Conceptual Framework for Dynamic Trust Monitoring and Prediction Olufunmilola Onolaja Rami Bahsoon Georgios Theodoropoulos School of Computer Science The.
Fuzzy Inference and Defuzzification
Pinpointing the security boundary in high-dimensional spaces using importance sampling Simon Tindemans, Ioannis Konstantelos, Goran Strbac Risk and Reliability.
All Hands Meeting, 2006 Title: Grid Workflow Scheduling in WOSE (Workflow Optimisation Services for e- Science Applications) Authors: Yash Patel, Andrew.
Interpersonal Trust Model Ing. Arnoštka Netrvalová DSS - seminar,
Supporting Privacy in E-learning with Semantic Streams Lori Kettel, Christopher Brooks, Jim Greer ARIES Laboratory Advanced Research in Intelligent Educational.
TRANSIMS Research and Deployment Project TRACC TSM Staff Dr. Vadim Sokolov Dr. Joshua Auld Dr. Kuilin Zhang Mr. Michael Hope.
Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara in collaboration with: D. Xu, R. Doverspike, D. Johnson and J. Rexford.
Chapter 7Louden, Programming Languages1 Chapter 7 - Control I: Expressions and Statements "Control" is the general study of the semantics of execution.
Peer-to-peer archival data trading Brian Cooper Joint work with Hector Garcia-Molina (and others) Stanford University.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Security-Driven Heuristics and A Fast Genetic Algorithm for Trusted Grid Job Scheduling Shanshan Song, Ricky Kwok, and Kai Hwang University of Southern.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
On Fairness, Optimizing Replica Selection in Data Grids Husni Hamad E. AL-Mistarihi and Chan Huah Yong IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS,
Peer-to-peer archival data trading Brian Cooper and Hector Garcia-Molina Stanford University.
Introduction to Rule-Based Systems, Expert Systems, Fuzzy Systems Introduction to Rule-Based Systems, Expert Systems, Fuzzy Systems (sections 2.7, 2.8,
Chapter 11: Artificial Intelligence
AHM /09/05 AHM 2005 Automatic Deployment and Interoperability of Grid Services G.Kecskemeti, Yonatan Zetuny, G.Terstyanszky,
Trust and Security Third Workshop Yonatan Zetuny, Gabor Terstyanszky, Stephen Winter, Peter Kacsuk Centre for Parallel Computing Cavendish School of Informatics.
Deploying Trust Policies on the Semantic Web Brian Matthews and Theo Dimitrakos.
Chapter 7 Advanced SQL Database Systems: Design, Implementation, and Management, Sixth Edition, Rob and Coronel.
Wireless Networks Breakout Session Summary September 21, 2012.
Chapter 1 An Introduction to Assurance and Financial Statement Auditing Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or.
Argumentation and Trust: Issues and New Challenges Jamal Bentahar Concordia University (Montreal, Canada) University of Namur, Belgium, June 26, 2007.
Young Suk Moon Chair: Dr. Hans-Peter Bischof Reader: Dr. Gregor von Laszewski Observer: Dr. Minseok Kwon 1.
Grid Resource Allocation and Management (GRAM) Execution management Execution management –Deployment, scheduling and monitoring Community Scheduler Framework.
Brian Matthews, DeFINE, Pisa 26/11/02 Trust and the Semantic Web Brian Matthews, Business & Information Technology Dept, CLRC
Management for IP-based Applications Mike Fisher BTexaCT Research
Chapter 3 DECISION SUPPORT SYSTEMS CONCEPTS, METHODOLOGIES, AND TECHNOLOGIES: AN OVERVIEW Study sub-sections: , 3.12(p )
Objectives Functionalities and services Architecture and software technologies Potential Applications –Link to research problems.
Grid Execution Management for Legacy Code Applications Grid Enabling Legacy Code Applications Tamas Kiss Centre for Parallel.
Combining Theory and Systems Building Experiences and Challenges Sotirios Terzis University of Strathclyde.
Scalable Computing on Open Distributed Systems Jon Weissman University of Minnesota National E-Science Center CLADE 2008.
Distributed Architectures A Comparative Analysis Client-Server (socket), RPC/RMI,P2P,Grid Where do you want to go today ? Chintan Odhavji Patel and Feng.
Scenarios for a Learning GRID Online Educa Nov 30 – Dec 2, 2005, Berlin, Germany Nicola Capuano, Agathe Merceron, PierLuigi Ritrovato
8 1 Chapter 8 Advanced SQL Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
Estimating Component Availability by Dempster-Shafer Belief Networks Estimating Component Availability by Dempster-Shafer Belief Networks Lan Guo Lane.
Health eDecisions Use Case 2: CDS Guidance Service Strawman of Core Concepts Use Case 2 1.
SPEECH DESCRIPTORS GENERATION SOFTWARE UTILIZED FOR CLASSIFICATION AND RECOGNITION PURPOSES Lukasz Laszko Department of Biomedical.
Service-oriented Resource Broker for QoS-Guaranteed in Grid Computing System Yichao Yang, Jin Wu, Lei Lang, Yanbo Zhou and Zhili Sun Centre for communication.
A Quantitative Trust Model for Negotiating Agents A Quantitative Trust Model for Negotiating Agents Jamal Bentahar, John Jules Ch. Meyer Concordia University.
Middleware for Campus Grids Steven Newhouse, ETF Chair (& Deputy Director, OMII)
July 14 th SAM 2008 Las Vegas, NV An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing Danfeng (Daphne) Yao Rutgers University,
6/23/2005 R. GARDNER OSG Baseline Services 1 OSG Baseline Services In my talk I’d like to discuss two questions:  What capabilities are we aiming for.
Resources Management and Component Placement Presenter:Bo Sheng.
Dynamic Trust Models for Ubiquitous Computing Environments Colin English, Paddy Nixon, Sotirios Terzis, Andrew McGettrick, Helen Lowe Department of Computer.
ShareNet Integrating Trust and Privacy policy Li Ding.
Part I Web Service Composition
Securing the Grid & other Middleware Challenges Ian Foster Mathematics and Computer Science Division Argonne National Laboratory and Department of Computer.
Computer Science and Engineering 1 Mobile Computing and Security.
01/02/2016Web security and Trust Management 1 Reza Mousoli Web Security and Trust Management.
A Simulation-Based Study of Overlay Routing Performance CS 268 Course Project Andrey Ermolinskiy, Hovig Bayandorian, Daniel Chen.
NeOn Components for Ontology Sharing and Reuse Mathieu d’Aquin (and the NeOn Consortium) KMi, the Open Univeristy, UK
Policy Based Management for Internet Communities Kevin Feeney, Dave Lewis, Vinny Wade, Knowledge and Data Engineering Group Trinity College Dublin Policy.
Sharing personal knowledge over the Semantic Web ● We call personal knowledge the knowledge that is developed and shared by the users while they solve.
Grid Execution Management for Legacy Code Architecture Exposing legacy applications as Grid services: the GEMLCA approach Centre.
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
Architecture for Resource Allocation Services Supporting Interactive Remote Desktop Sessions in Utility Grids Vanish Talwar, HP Labs Bikash Agarwalla,
VIEWS b.ppt-1 Managing Intelligent Decision Support Networks in Biosurveillance PHIN 2008, Session G1, August 27, 2008 Mohammad Hashemian, MS, Zaruhi.
Trustworthiness Management in the Social Internet of Things
Chapter 1 An Introduction to Assurance and Financial Statement Auditing.
The Extensible Tool-chain for Evaluation of Architectural Models
The Design of a Grid Computing System for Drug Discovery and Design
WS Standards – WS-* Specifications
A Semantic Peer-to-Peer Overlay for Web Services Discovery
The Network Approach: Mind as a Web
Presentation transcript:

University of Westminster – Y. Zetuny, G. Terstyanszky, S. Winter, P. Kacsuk Centre for Parallel Computing Cavendish School of Informatics University of Westminster Articulating Subjective Trust-Based Decision Strategies Utilizing the Reputation-Policy Trust Management Service

OVERVIEW Research Background Reputation-Policy Based Trust in Grid computing Reputation-Policy Trust Model Grid Reputation-Policy Trust Management Service Architecture Test bed deployment, simulation & tests Summary Trust Management

 Approaches for trust management: –Static -> policy-based: Web services, E-Commerce –Dynamic -> Reputation based: P2P, Ad-hoc networks  Requirements for trust management: –Establishing dynamic trust evaluation of resources to minimise risk of execution failure –Autonomic trust decision making based on reputation evaluation strategy –Expressing reputation using policy assertions in order to promote semantic interoperability. Trust Management

Challenges of Trust Management Challenge No. 1: Traditional trust management in Grid computing addresses trust through security policies. Solution: Reputation provides trust evaluation measurements in dynamic scenarios between Grid actors and resources. Challenge No. 2: Grid actors are not able to calculate the trust value of a Grid resource by specifying their own trust evaluation criteria and they are obliged to rely on a community reputation algorithm to compute trust values. Solution: Combining policy framework with a reputation algorithm and allowing Grid actors to be involved in the trust and reputation evaluation process

Distributed data model : trust data is divided between Grid client and reputation algorithm. Trust Model contains three artefacts: ◦ Trust Decision Strategy (TDS) > Heuristics  Trust Evaluation Model > Subjective view  Trust Decision Model > Opportunistic view ◦ Opinion Matrices (OM)  Store and make available historical execution data ◦ Correlation Process (CP)  Correlates each opinion element in the TDS with its historical ratings in the OM.  Computes trust values using an Opinion Summary Table (OST). Reputation-Based Trust Management

 Trust Decision Strategy is represented by Fuzzy Tree Model (FTM) expressing reputation-policy statements which are defined by trusting agents.  It has two branches: –Trust Evaluation Model (TEM) Permutation of opinions representing subjective trust building blocks (e.g. availability, reliability, cost, etc). –Trust Decision Model (TDM) Potential trust value calculation outcomes and opportunistic correspondent courses of actions. Trust Decision Strategy

TDS = {TEM; (TDR1;TDR2; … ;TDRn)} Trust Decision Strategy

Opinion Matrice values are based on time series distribution, trust decay function, cut off time and weighted mean When an execution is completed, a trusting agent evaluates the quality of the transaction on the resource and the opinion matrice stores these historical evaluation feedback values. computed trust (fuzzy) value MS - opinion matrice set M(O) - opinion matrice (application or job-level)

Correlation Process (CP)  It matches each opinion defined in TDS with its historical references in the Opinion Matrices and calculating the trust value for that opinion.  Each TDS opinion type is routed via the Metrics Pool (MP) in order to return a correspondent OM.  The CP examines the opinion’s source nodes (experience, reputation) and their weight factors.  The CP generates two vectors: experience vector and reputation vector and calculates the opinion value using a standard mean :

GREPTrust’s domains: Client Domain – Grid Client, TDS Data Store Service Domain – Querying Manager, Feedback Manager and Admin Manager Data Domain – Reputation-Policy Data Store Architecture of Reputation-Based Trust Management

Step No. 1 –Grid client submits a Reputation-Policy Query (RPQ) to the GREPTrust resource. Step No. 2 - GREPTrust resource processes the RPQ, generates Reputation-Policy Report (RPR) and delivers it to the Grid client. Step No. 3 –The Grid client utilises the RPR in order to make a decision on which resource(s) to submit the job to. Steps of Reputation-Based Trust Management

STEP1: Process TDS Evaluation Model STEP2: Process TDS Decision Model STEP3: Generate Reputation-Policy Report Processing a Trust Query

TDS – Fuzzy Interference Engine

Permutation of opinions Permutation of Sources Trust Evaluation Model – Opinions

Trust Decision Model – Trust Values Term names The value of the trust_value variable has to be converted into degrees of membership for the membership functions defined on the variable. Input variable Membership functions

Membership functions Output variable Trust Decision Model – Trust Levels

Trust Decision Model – Fuzzy Interference 17 IF trust_value IS poor THEN trust_level IS none IF trust_value IS good THEN trust_level IS limited IF trust_value IS excellent THEN trust_level IS full trust level: 0.32 Accumulation Method: MAX Defuziffication Method: COG Implication Method: MIN trust value: 0.11

TDM: Trust Level TDM: Degree membership Trust Decision Model – Output

Questions