期刊文献+

网格环境下基于信任模型的动态级调度 被引量:53

Dynamic Level Scheduling Based on Trust Model in Grid Computing
在线阅读 下载PDF
导出
摘要 网格用户、资源和服务的不确定性潜在地影响网格应用任务的正常执行,这样使得设计既能减小应用任务执行时间又能减小欺骗可能性的调度算法十分困难.参考社会学的人际关系信任模型,建立网格节点信任推荐机制,并利用D-S理论对推荐证据进行综合分析,从而定义出基于不确定性推理理论的信任度计算函数.将该函数并入DLS算法得到“可信”动态级调度算法(TDLS),从而在计算调度级别时考虑网格节点的可信程度.仿真结果证实,提出的TDLS算法以小的时间花费为代价,能有效提高任务在信任方面的服务质量需求. The uncertainty of Grid users, resources and services may play a negative affect on the execution of Grid tasks, which makes it difficult to design a scheduling algorithm to minimize execution time and cheat probability of Grid tasks. Referring to the social trust relationship, the authors introduce a trust model that is based on the uncertainty reasoning theory (D-S theory). In addition, by combining the trust model and Dynamic Level Scheduling (DLS) algorithm, the authors propose a novel scheduling algorithm that is called Trustworthy and Dynamic Level Scheduling (TDLS). The algorithm takes the Grid nodes' trust degree into account when calculating the scheduling-level of task-node pairs. Simulations prove that the algorithm can efficiently satisfy the QoS requirement in trust, with costing a few more time.
出处 《计算机学报》 EI CSCD 北大核心 2006年第7期1217-1224,共8页 Chinese Journal of Computers
基金 本课题得到国家自然科学基金(60173026) 中国教育部科研重点项目基金(105071) 上海高校网格技术E-研究院项目(200301-1)资助.
关键词 网格计算 可信调度 信任模型 不确定性推理 DLS算法 algorithm Grid computing trustworthy scheduling trust model uncertainty reasoning DLS
  • 相关文献

参考文献18

  • 1Foster I.,Kesselman C.,Tuecke S..The anatomy of the Grid:Enabling scalable virtual organizations.International Journal of Supercomputer Application,2001,15(3):200~222
  • 2Foster I..Globus toolkit version 4:Software for service-oriented systems.In:Proceedings of the IFIP International Conference on Network and Parallel Computing,Beijing,2005,2~ 13
  • 3Lee E.A.,Messerschmitt D.G..Static scheduling of synchronous data flow programs for digital signal processing.IEEE Transactions on Computers,1987,C-36 (1):24~35
  • 4Iverson M.,Ozguner F..Dynamic,competitive scheduling of multiple DAGs in a distributed heterogeneous environment.In:Proceedings of the 7th Heterogeneous Computing Workshop,Orlando,Florida,USA,1998,70~78
  • 5Sih G.C.,Lee E.A..A compile-time scheduling heuristic for interconnection-constraint heterogeneous processor architectures.IEEE Transactions on Parallel and Distributed Systems,1993,4(2):175~187
  • 6Shatz S.M.,Wang J.P.,Goto M..Task allocation for maximizing reliability of distributed computer systems.IEEE Transactions on Computers,1992,41(9):1156~1168
  • 7Dogan A.,Ozguner F..Matching and scheduling algorithms for minimizing execution time and failure probability of applications in heterogeneous computing.IEEE Transactions on Parallel and Distributed Systems,2002,13(3):308~323
  • 8Dempster A..Upper and lower probabilities induced by multivalued mapping.Annals of Mathematical Statistics,1967,38(2):325~339
  • 9Shafer G..A Mathematical Theory of Evidence.Princeton,NJ:Princeton University Press,1976
  • 10Sentz K..Combination of evidence in dempster-shafer theory.Sandia National Laboratories:Technical Report:SAND2002-0835,2002

二级参考文献74

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:252
  • 2Buyya Rajkumar. High performance cluster computing [M].Beijing: Posts & Telecom Press, 2002.
  • 3Libra. The libra cluster scheduler report and user manual[EB/OL]. http://www. buyya. com/libra/.
  • 4Foster Ⅰ, Kesselman C. Globus: a metacomputing infrastructure toolkit [J]. International Journal of Supercomputer Applications, 1997,11(2),115-128.
  • 5George Ma, Paul Lu. PBSWeb: a Web-based interface to the portable batch system[C]. 12th IASTED International Conference on Parallel and Distributed Computing and Systems (PDCS), Las Vegas, Nevada, U. S. A., 2000, http://www.cs. ualberta. ca/~pinchak/PBSWeb/.
  • 6Jahanzeb Scherwani, Nosheen Ali, Nausheen Lotia et al. Libra:acomputational economy-based job scheduling system for clusters[J]. Software-Practice and Experience, 2004,10,581-.
  • 7Qu G.,Jayaprakash,Ramkishore M.,Hariri S.,Raghavendra C.S.A framework for network vulnerability analysis.In:Proceedings of the 1st IASTED International Conference on Communications,Internet,Information Technology (CⅡT2002),St.Thomas,Virgin Islands,USA,2002,289~298
  • 8Moore A.P.,Ellison R.J.,Linger R.C.Attack modeling for information security and survivability.Carnegie Mellon Univer sity:Technical Note CMV/SEI-2001-TH-001,2001
  • 9Jonsson E.,Olovsson T.A quantitative model of the security intrusion process based on attacker behavior.IEEE Transactions on Software Engineering,1997,23(4):235~245
  • 10Mahimkar A.,Shmatikov V.Game-based analysis of Denial-of-service prevention protocols.In:Proceedings of the IEEE Computer Security Foundations Workshop(CSFW05),Aix-en-Provence,France,2005,287~301

共引文献370

同被引文献455

引证文献53

二级引证文献214

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部