Game-based Models of Grid Users’ Decisions in Security Aware Scheduling

نویسندگان

  • Joanna Kolodziej
  • Samee Ullah Khan
  • Lizhe Wang
  • Dan Chen
چکیده

This chapter summarizes our recent research on game-theoretical models of grid users’ behavior in security aware scheduling. The main scheduling attributes, generic model of security aware management in local grid clusters and several scenarios of users’ games are presented. Four GA-based hybrid schedulers have been implemented for the approximation of the equilibrium states of exemplary simple symmetric game of the grid end users. The proposed hybrid resolution methLarge Scale Network-Centric Computing Systems, 1st edition. By Albert Y. Zomaya and Hamid Sarbazi-Azad Copyright c ⃝ 2012 John Wiley & Sons, Inc. 1 2 GAME-BASED MODELS OF GRID USERS’ DECISIONS... ods are empirically evaluated through the grid simulator under the heterogeneity, security, large-scale and dynamics conditions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A JOINT DUTY CYCLE SCHEDULING AND ENERGY AWARE ROUTING APPROACH BASED ON EVOLUTIONARY GAME FOR WIRELESS SENSOR NETWORKS

Network throughput and energy conservation are two conflicting important performance metrics for wireless sensor networks. Since these two objectives are in conflict with each other, it is difficult to achieve them simultaneously. In this paper, a joint duty cycle scheduling and energy aware routing approach is proposed based on evolutionary game theory which is called DREG. Making a trade-off ...

متن کامل

Green Energy-aware task scheduling using the DVFS technique in Cloud Computing

Nowdays, energy consumption as a critical issue in distributed computing systems with high performance has become so green computing tries to energy consumption, carbon footprint and CO2 emissions in high performance computing systems (HPCs) such as clusters, Grid and Cloud that a large number of parallel. Reducing energy consumption for high end computing can bring various benefits such as red...

متن کامل

A Security Prioritized Computational Grid Scheduling Model: An Analysis

Grid supports heterogeneities of resources in terms of security and computational power. Applications with stringent security requirement introduce challenging concerns when executed on the grid resources. Though grid scheduler considers the computational heterogeneity while making scheduling decisions, little is done to address their security heterogeneity. This work proposes a security aware ...

متن کامل

Security Aware Parallel and Independent Job Scheduling in Grid Computing Environments Based on Adaptive Job Replication

In grid environment, jobs may be scheduled to multiple machines across different administrative domains. However, grid security is a main hurdle to make the job scheduling decision secure, reliable and fault tolerant. A security-aware parallel and independent job scheduling algorithm in grid computing environment based on adaptive job replications was proposed. In risky and failure-prone grids,...

متن کامل

Interdependent Security Game Design over Constrained Linear Influence Networks

In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012