Ahmed Bendahmane | Université Abdelmalek Essaâdi (original) (raw)
Uploads
Papers by Ahmed Bendahmane
Large scale grids permit to share grid resources spread over different autonomous administrative ... more Large scale grids permit to share grid resources spread over different autonomous administrative sites in the internet. The rapid progress of grid systems opens the door for numerous companies to adopt this technology in their business development. This progress is characterized by the increasing openness and opportunity of resource-sharing across organizations in different domains. In the business context, these shared resources can be misused by some malicious users that can abuse the provided resources and make them behave maliciously to return wrong results and sabotage the jobs execution. The common technique used by most grid systems to deal with this problem is based on replication with voting. Nevertheless, these techniques rely on the assumption that the grid resources behave independently. They may be ineffective where a number of collusive resources collectively return the same wrong results of a job execution. In order to overcome this threat, we propose a Reputation-Based Voting (RBV) approach, which investigates the trustworthiness of the grid resources through a reputation system, and then takes a decision about the results. In addition, the performance of our approach and other voting techniques, like m-first voting and credibility-based voting, are evaluated through simulation to perceive the effect of collusive grid resources on the correctness of the results. The obtained results show that our approach achieves a lower errorrate and better performance in terms of overhead.
In the past ten years, grid computing has been heavily researched and developed. At the present, ... more In the past ten years, grid computing has been heavily researched and developed. At the present, grid technology has matured enough to enable the realization of workable and commercial infrastructures, platforms and tools, ready to be used in production environments ranging from scientific to commercial application domains. As grid resources are used outside of organizational boundaries, it becomes increasingly difficult to guarantee that a resource being used is not malicious in some way. However, the critical grid application domains require many protections against malicious entities or massive attacks. It is then necessary to detect and tolerate malicious behavior of grid resources (or resources provider) in order to enhance the efficiency of grid security architecture. In this paper, we will propose and discuss an attack-tolerance mechanism based on sabotage tolerance technique. The grid broker service will build the reputation of all resources provider, by observing their trustworthiness from their previous results. The reputation value can be used in the validation process of job result by using majority voting technique.
IADIS INTERNATIONAL JOURNAL ON COMPUTER SCIENCE AND INFORMATION SYSTEMS 01/2014; 9(1):55-70.
The Agent in Grid (AiG) project aims to develop an agent-based infrastructure that facilitates th... more The Agent in Grid (AiG) project aims to develop an agent-based infrastructure that facilitates the resource management in the Grid. The core assumptions behind the system are: software agents representing Grid resources work in teams, and all information is ontologically represented and semantically processed. Thus far, trust management in AiG system is approached from the perspective of breaching an agreement between Users and teams or contracts between teams and Workers. Unfortunately, it is also possible that some Workers, which fulfilled the agreement, could have maliciously returned incorrect results from the jobs that they executed. In this paper, we discuss how the trust management in the AiG project can be improved by using a reputation-based voting technique, in order to assure reliable job execution.
MapReduce is becoming a powerful parallel data processing model and is adopted by many cloud serv... more MapReduce is becoming a powerful parallel data processing model and is adopted by many cloud services providers to build cloud computing framework. However, in public cloud systems, several service providers may come from different administration domain out of the user control and may be untrustworthy. Hence, security of MapReduce computation is essential in public cloud systems. Additionally, MapReduce data-processing services are long-running, which increases the possibility that an attacker is able to compromise some workers and make them misbehave to corrupt the integrity of all computations allocated to these workers. Thus, the computation integrity is a major concern for Mapreduce user in public cloud environment. In this paper, we propose a new mechanism to ensure the computation integrity of MapReduce in public cloud computing environment. By using replication-based voting method and reputation-based trust management system, our mechanism can efficiently detect both collusive and non-collusive malicious workers and guarantee high computation accuracy with an acceptable overhead.
MapReduce has been widely used as a powerful parallel data processing model and is adopted by mos... more MapReduce has been widely used as a powerful parallel data processing model and is adopted by most cloud providers to built cloud computing framework. However, in open cloud systems, security of computation becomes a great challenge. Moreover, MapReduce data-processing services are long-running, which increase the opportunity that an adversary launches attack to the workers and make them behave maliciously and, then tamper with the computation integrity of user tasks where their executions are generally performed in different administration domains out of the user control. Thus, the results of the computation might be erroneous and dishonest. In this paper, we propose a new mechanism based on weighted t-first voting method for ensuring the integrity of MapReduce in open cloud computing environment. Our mechanism can defeat both collusive and non-collusive malicious entities and thus guarantee high computation accuracy.
In the past ten years, grid computing has been heavily researched and developed. At the present, ... more In the past ten years, grid computing has been heavily researched and developed. At the present, grid technology has matured enough to enable the realization of workable and commercial infrastructures, platforms and tools, ready to be used in production environments ranging from scientific to commercial application domains. As grid resources are used outside of organizational boundaries, it becomes increasingly difficult to guarantee that a resource being used is not malicious in some way. However, the critical grid application domains require many protections against malicious entities or massive attacks. It is then necessary to detect and tolerate malicious behavior of grid resources (or resources provider) in order to enhance the efficiency of grid security architecture. In this paper, we will propose and discuss an attack-tolerance mechanism based on sabotage tolerance technique. The grid broker service will build the reputation of all resources provider, by observing their trustworthiness from their previous results. The reputation value can be used in the validation process of job result by using majority voting technique.
Grid computing has recently seen a great importance in diverse applications domains of scientific... more Grid computing has recently seen a great importance in diverse applications domains of scientific, industrial, and commercial activities, which demand huge computational power. Unlike traditional cluster computing, large scale grids permit the sharing of grid resources spread through different administrative sites autonomy. The distributed and dynamic features of grid resources, their architectures heterogeneity, and unreliable interconnection network increases the probability of attacks and malicious behavior of grid resources. In Grid applications, reliability and security assurance of execution are two basic requirements. Thus, it is necessary to guarantee that, among the shared grid resources, there are no malicious behaviors interested in invalidating or corrupting the job results. In order to ensure reliable and safe jobs computation in grid systems, we have proposed a new approach for tolerating malicious grid resources by using reputation to improve the efficiency of majority voting mechanisms. The grid broker service investigates the trustworthy of the grid resources that are used in the voting procedure; this investigation is based on reputation management system which maintains a reputation value for each grid resource based on its historical behavior. The validation of the result is then decided based on the reputation level of the grid resources.
In service oriented computing applications, different resources in grid systems are encapsulated ... more In service oriented computing applications, different resources in grid systems are encapsulated abstractly as services. Sometime, single service software can provide valuable service functions for service consumers, but most of the time, single atomic service can not satisfy them. In this case, the system builds a new composite service, which selects all available qualified grid service for composition. Services with similar and compatible functionality may be offered at different QoS levels. Thus, to build a service process, decisions must be made to select component services at appropriate QoS levels. Therefore, quality of service (QoS) aspects is crucial for selecting the grid services to take part in the composition of the new service. In this paper, we address to the problem of Grid services composition based on QoS parameters with end-to-end constraints, we suggest a new model, which transform any model of composition to a sequential model, and we propose a new approach based on the application of a Fuzzy Multiple Attribute Decision Making technique in order to guide the composition process to selected an optimal composite service.
Page 1. Grid Computing Security Mechanisms: State-of-The-Art A.Bendahmane, M.Essaaidi, A.El Mouss... more Page 1. Grid Computing Security Mechanisms: State-of-The-Art A.Bendahmane, M.Essaaidi, A.El Moussaoui, A.Younes Faculty of Science, Abdelmalek Essaadi University Tetuan, Morocco. {a.dahman , elmoussaoui, younes.ali@uae.ma} / essaaidi@ieee.org ...
... A.Younes, M.Essaaidi, A.EI Moussaoui, A.Bendahmane Faculty of Science, Abdelmalek Essaadi Uni... more ... A.Younes, M.Essaaidi, A.EI Moussaoui, A.Bendahmane Faculty of Science, Abdelmalek Essaadi University Tetouan, Morocco. {younes.ali, essaaidi, elmoussaoui, a.dahman @uae.ma} Abstract-Information services are one of the most important requirements of the grid system. ...
Large scale grids permit to share grid resources spread over different autonomous administrative ... more Large scale grids permit to share grid resources spread over different autonomous administrative sites in the internet. The rapid progress of grid systems opens the door for numerous companies to adopt this technology in their business development. This progress is characterized by the increasing openness and opportunity of resource-sharing across organizations in different domains. In the business context, these shared resources can be misused by some malicious users that can abuse the provided resources and make them behave maliciously to return wrong results and sabotage the jobs execution. The common technique used by most grid systems to deal with this problem is based on replication with voting. Nevertheless, these techniques rely on the assumption that the grid resources behave independently. They may be ineffective where a number of collusive resources collectively return the same wrong results of a job execution. In order to overcome this threat, we propose a Reputation-Based Voting (RBV) approach, which investigates the trustworthiness of the grid resources through a reputation system, and then takes a decision about the results. In addition, the performance of our approach and other voting techniques, like m-first voting and credibility-based voting, are evaluated through simulation to perceive the effect of collusive grid resources on the correctness of the results. The obtained results show that our approach achieves a lower errorrate and better performance in terms of overhead.
In the past ten years, grid computing has been heavily researched and developed. At the present, ... more In the past ten years, grid computing has been heavily researched and developed. At the present, grid technology has matured enough to enable the realization of workable and commercial infrastructures, platforms and tools, ready to be used in production environments ranging from scientific to commercial application domains. As grid resources are used outside of organizational boundaries, it becomes increasingly difficult to guarantee that a resource being used is not malicious in some way. However, the critical grid application domains require many protections against malicious entities or massive attacks. It is then necessary to detect and tolerate malicious behavior of grid resources (or resources provider) in order to enhance the efficiency of grid security architecture. In this paper, we will propose and discuss an attack-tolerance mechanism based on sabotage tolerance technique. The grid broker service will build the reputation of all resources provider, by observing their trustworthiness from their previous results. The reputation value can be used in the validation process of job result by using majority voting technique.
IADIS INTERNATIONAL JOURNAL ON COMPUTER SCIENCE AND INFORMATION SYSTEMS 01/2014; 9(1):55-70.
The Agent in Grid (AiG) project aims to develop an agent-based infrastructure that facilitates th... more The Agent in Grid (AiG) project aims to develop an agent-based infrastructure that facilitates the resource management in the Grid. The core assumptions behind the system are: software agents representing Grid resources work in teams, and all information is ontologically represented and semantically processed. Thus far, trust management in AiG system is approached from the perspective of breaching an agreement between Users and teams or contracts between teams and Workers. Unfortunately, it is also possible that some Workers, which fulfilled the agreement, could have maliciously returned incorrect results from the jobs that they executed. In this paper, we discuss how the trust management in the AiG project can be improved by using a reputation-based voting technique, in order to assure reliable job execution.
MapReduce is becoming a powerful parallel data processing model and is adopted by many cloud serv... more MapReduce is becoming a powerful parallel data processing model and is adopted by many cloud services providers to build cloud computing framework. However, in public cloud systems, several service providers may come from different administration domain out of the user control and may be untrustworthy. Hence, security of MapReduce computation is essential in public cloud systems. Additionally, MapReduce data-processing services are long-running, which increases the possibility that an attacker is able to compromise some workers and make them misbehave to corrupt the integrity of all computations allocated to these workers. Thus, the computation integrity is a major concern for Mapreduce user in public cloud environment. In this paper, we propose a new mechanism to ensure the computation integrity of MapReduce in public cloud computing environment. By using replication-based voting method and reputation-based trust management system, our mechanism can efficiently detect both collusive and non-collusive malicious workers and guarantee high computation accuracy with an acceptable overhead.
MapReduce has been widely used as a powerful parallel data processing model and is adopted by mos... more MapReduce has been widely used as a powerful parallel data processing model and is adopted by most cloud providers to built cloud computing framework. However, in open cloud systems, security of computation becomes a great challenge. Moreover, MapReduce data-processing services are long-running, which increase the opportunity that an adversary launches attack to the workers and make them behave maliciously and, then tamper with the computation integrity of user tasks where their executions are generally performed in different administration domains out of the user control. Thus, the results of the computation might be erroneous and dishonest. In this paper, we propose a new mechanism based on weighted t-first voting method for ensuring the integrity of MapReduce in open cloud computing environment. Our mechanism can defeat both collusive and non-collusive malicious entities and thus guarantee high computation accuracy.
In the past ten years, grid computing has been heavily researched and developed. At the present, ... more In the past ten years, grid computing has been heavily researched and developed. At the present, grid technology has matured enough to enable the realization of workable and commercial infrastructures, platforms and tools, ready to be used in production environments ranging from scientific to commercial application domains. As grid resources are used outside of organizational boundaries, it becomes increasingly difficult to guarantee that a resource being used is not malicious in some way. However, the critical grid application domains require many protections against malicious entities or massive attacks. It is then necessary to detect and tolerate malicious behavior of grid resources (or resources provider) in order to enhance the efficiency of grid security architecture. In this paper, we will propose and discuss an attack-tolerance mechanism based on sabotage tolerance technique. The grid broker service will build the reputation of all resources provider, by observing their trustworthiness from their previous results. The reputation value can be used in the validation process of job result by using majority voting technique.
Grid computing has recently seen a great importance in diverse applications domains of scientific... more Grid computing has recently seen a great importance in diverse applications domains of scientific, industrial, and commercial activities, which demand huge computational power. Unlike traditional cluster computing, large scale grids permit the sharing of grid resources spread through different administrative sites autonomy. The distributed and dynamic features of grid resources, their architectures heterogeneity, and unreliable interconnection network increases the probability of attacks and malicious behavior of grid resources. In Grid applications, reliability and security assurance of execution are two basic requirements. Thus, it is necessary to guarantee that, among the shared grid resources, there are no malicious behaviors interested in invalidating or corrupting the job results. In order to ensure reliable and safe jobs computation in grid systems, we have proposed a new approach for tolerating malicious grid resources by using reputation to improve the efficiency of majority voting mechanisms. The grid broker service investigates the trustworthy of the grid resources that are used in the voting procedure; this investigation is based on reputation management system which maintains a reputation value for each grid resource based on its historical behavior. The validation of the result is then decided based on the reputation level of the grid resources.
In service oriented computing applications, different resources in grid systems are encapsulated ... more In service oriented computing applications, different resources in grid systems are encapsulated abstractly as services. Sometime, single service software can provide valuable service functions for service consumers, but most of the time, single atomic service can not satisfy them. In this case, the system builds a new composite service, which selects all available qualified grid service for composition. Services with similar and compatible functionality may be offered at different QoS levels. Thus, to build a service process, decisions must be made to select component services at appropriate QoS levels. Therefore, quality of service (QoS) aspects is crucial for selecting the grid services to take part in the composition of the new service. In this paper, we address to the problem of Grid services composition based on QoS parameters with end-to-end constraints, we suggest a new model, which transform any model of composition to a sequential model, and we propose a new approach based on the application of a Fuzzy Multiple Attribute Decision Making technique in order to guide the composition process to selected an optimal composite service.
Page 1. Grid Computing Security Mechanisms: State-of-The-Art A.Bendahmane, M.Essaaidi, A.El Mouss... more Page 1. Grid Computing Security Mechanisms: State-of-The-Art A.Bendahmane, M.Essaaidi, A.El Moussaoui, A.Younes Faculty of Science, Abdelmalek Essaadi University Tetuan, Morocco. {a.dahman , elmoussaoui, younes.ali@uae.ma} / essaaidi@ieee.org ...
... A.Younes, M.Essaaidi, A.EI Moussaoui, A.Bendahmane Faculty of Science, Abdelmalek Essaadi Uni... more ... A.Younes, M.Essaaidi, A.EI Moussaoui, A.Bendahmane Faculty of Science, Abdelmalek Essaadi University Tetouan, Morocco. {younes.ali, essaaidi, elmoussaoui, a.dahman @uae.ma} Abstract-Information services are one of the most important requirements of the grid system. ...