期刊名称:International Journal of Hybrid Information Technology
印刷版ISSN:1738-9968
出版年度:2009
卷号:2
期号:1
出版社:SERSC
摘要:Since the resource of nodes can access and leave the Grid system freely, it is possible some malicious nodes exist in the Grid environment. In addition, the numbers and qualities of nodes' resource can be changed dramatically and optionally, so these malicious nodes must be affecting the utilization of Grid resource. Hence, the trust management mechanisms are developed and widely used in the resource scheduling for Grid environments. However, most of the trust management models are mainly focus on the nodes historic behaviors and few of them consider the future trust of the node based on its previous activities. This paper proposes a new method to detect the nodes behaviors of resource providers in Grid environments based on D-S theory. Through simulating experiments, the new mechanism could record the behaviors exactly and prevent the malicious ones accessing the Grid system effectively. It would give a strong support for the success of resource scheduling in Grid environments