Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.

Article

Download file Download BibTeX

Title

Security Aspects in Resource Management Systems in Distributed Computing Environments

Authors

[ 1 ] Instytut Informatyki, Wydział Informatyki, Politechnika Poznańska | [ P ] employee

Scientific discipline (Law 2.0)

[2.3] Information and communication technology

Year of publication

2017

Published in

Foundations of Computing and Decision Sciences

Journal year: 2017 | Journal volume: vol. 42 | Journal number: no. 4

Article type

scientific article

Publication language

english

Keywords
EN
  • security
  • reputation
  • distributed systems
  • resource management
Abstract

EN In many distributed computing systems, aspects related to security are getting more and more relevant. Security is ubiquitous and could not be treated as a separated problem or a challenge. In our opinion it should be considered in the context of resource management in distributed computing environments like Grids and Clouds, e.g. scheduled computations can be much delayed because of cyber-attacks, inefficient infrastructure or users valuable and sensitive data can be stolen even in the process of correct computation. To prevent such cases there is a need to introduce new evaluation metrics for resource management that will represent the level of security of computing resources and more broadly distributed computing infrastructures. In our approach, we have introduced a new metric called reputation, which simply determines the level of reliability of computing resources from the security perspective and could be taken into account during scheduling procedures. The new reputation metric is based on various relevant parameters regarding cyber-attacks (also energy attacks), administrative activities such as security updates, bug fixes and security patches. Moreover, we have conducted various computational experiments within the Grid Scheduling Simulator environment (GSSIM) inspired by real application scenarios. Finally, our experimental studies of new resource management approaches taking into account critical security aspects are also discussed in this paper.

Date of online publication

09.12.2017

Pages (from - to)

299 - 313

DOI

10.1515/fcds-2017-0015

URL

https://www.sciendo.com/article/10.1515/fcds-2017-0015

License type

CC BY-NC-ND (attribution - noncommercial - no derivatives)

Open Access Mode

publisher's website

Open Access Text Version

final published version

Date of Open Access to the publication

at the time of publication

Full text of article

Download file

Access level to full text

public

Ministry points / journal

15

Ministry points / journal in years 2017-2021

15

This website uses cookies to remember the authenticated session of the user. For more information, read about Cookies and Privacy Policy.