Proposed Tree Based Trust Algorithm (TBTA) for Manufacturing Grid (MGrid)

Abstract

In order to safeguard the private data in the Grid-based collaborative manufacturing environment, providing security is a crucial challenge. The crucial component of Manufacturing Grid is trust management, which is connected to resource sharing, role assignment, cooperation across resource entities from various domains requires careful consideration how to determine and estimate the suggested level of trust. In this research, we present a Tree Based Trust Algorithm for MGrid that combines elements of Interactive Trust, Honesty Trust, and Content Trust. The primary purpose of this research is to minimize the possibility of misleading nodes and to lessen the expense of routing as well as secured data transfer by making use of trust levels.

Country : India

1 Avijit Bhowmick2 Goutam Sutradhar3 Arup Kumar Nandi

  1. Budge Budge Institute of Technology, Kolkata, India
  2. Director, NIT- Manipur & Professor, Dept. of Mech. Engg., Jadavpur University (On Lien), India
  3. Senior Principal Scientist, CSIR-CMERI, Durgapur, India

IRJIET, Volume 7, Issue 1, January 2023 pp. 55-60

doi.org/10.47001/IRJIET/2023.701009

References

  1. Fan YS, Zhao DZ, Zhang LQ, Huang SX, Liu B. Manufacturing grid: Needs, concept, and architecture. Source: Gird and Cooperative Computing, pt 1 3032: 653-65, 2004.
  2. W Mao. An identity-based non-interactive authentication framework for computational grids. Hewlett-Packard Laboratories, technical report HPL-2004-096, 2004.
  3. PENG Hua-Xi. Chinese Journal of Computers, 2006, 29(8), 1271-1281.
  4. XU Feng, LU Jian, ZHENG Wei, CAO Chun. Journal of Software. 2003, 14(06), 1043-1051.
  5. CHEN Jian-Gang WANG Ru-Chuan WANG Hai-Yan. Computer Science, 2007, 34(7), 80-83.
  6. Globus Security Team, Globus Toolkit Version 4 Grid Security Infrastructure: A Standards Perspective.http://www.globus.org/toolkit/docs/4.0/security/GT4-GSI-Overview.pdf, Version 4, September 12th, 2005.
  7. L. Pearlman, V. Welch, I. Foster, and C. Kesselman, A Community Authorization Service for Group Collaboration," Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks, 2002.
  8. R. Sandhu, E. Coyne, H. Feinstein, and C. Youman., “Role-based Access Control Models,” Proceedings of the 5th ACM1 Workslop on Role-Based Access Control, 2000, pp. 38-47.
  9. S. Godik et al, "eXtensible Access Control Markup Language (XACML) Vers. 1.1", OASIS Standard, July, 2003
  10. P. Hallam-Baker et al, "Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML)", Oasis Standard, November 5th. 2002.
  11. Marty Humphrey. Mary R. Thompson, "Security Implications of Typical Grid Computing Usage Scenarios", Cluster Computing 5, 257-264, 2002.
  12. Lorch, M., Adams, D. B., Kafura, D., Koneni, M.S. R, Rathi, A., Shah, S., "The PRIMA System for Privilege Management, Authorization and Enforcement in Grid Environments", Proceedings of the Fourth International Workshop on Grid Computing.