Presentation is loading. Please wait.

Presentation is loading. Please wait.

Trust and Security for Next Generation Grids, www.gridtrust.eu Usage Control in Action: Controlling Resource Usage in a Grid-Based Supply Chain Lorenzo.

Similar presentations


Presentation on theme: "Trust and Security for Next Generation Grids, www.gridtrust.eu Usage Control in Action: Controlling Resource Usage in a Grid-Based Supply Chain Lorenzo."— Presentation transcript:

1 Trust and Security for Next Generation Grids, www.gridtrust.eu Usage Control in Action: Controlling Resource Usage in a Grid-Based Supply Chain Lorenzo Blasi HP Italy Innovation Center February 2009

2 Trust and Security for Next Generation Grids, www.gridtrust.eu Agenda Business context / Grid proposal Business context / Grid proposal Solving the Vehicle Routing Problem Solving the Vehicle Routing Problem Security issues / GridTrust solution Security issues / GridTrust solution Architecture Architecture Future evolution Future evolution

3 Trust and Security for Next Generation Grids, www.gridtrust.eu Agenda Business context / Grid proposal Business context / Grid proposal Solving the Vehicle Routing Problem Solving the Vehicle Routing Problem Security issues / GridTrust solution Security issues / GridTrust solution Architecture Architecture Future evolution Future evolution

4 Trust and Security for Next Generation Grids, www.gridtrust.eu Business Context / Producers Competitiveness in the Pharmaceuticals market has increased Competitiveness in the Pharmaceuticals market has increased  appearance of "generic" pharma products  pressure from public institutions  pharma products can now be sold in large retailers Producers' and Distributors' margins decrease Producers' and Distributors' margins decrease Transportation costs have big influence on final product price Transportation costs have big influence on final product price To reduce costs and maintain profit margins big industries have created their own e-procurement auctioning system for transportation services To reduce costs and maintain profit margins big industries have created their own e-procurement auctioning system for transportation services This leverages competition by searching the lowest possible price on each single transportation task This leverages competition by searching the lowest possible price on each single transportation task

5 Trust and Security for Next Generation Grids, www.gridtrust.eu Business Context / Transporters Small transporters, to avoid being crushed between raising prices and competitive pressure Small transporters, to avoid being crushed between raising prices and competitive pressure  must increase the optimization level of their business The Transporters' Association proposes to its members a common Grid system that can optimize both routes and scheduling of their whole vehicles' fleets The Transporters' Association proposes to its members a common Grid system that can optimize both routes and scheduling of their whole vehicles' fleets Daily optimization is already a big leap forward for most transporters, but a Grid allows more than that: Daily optimization is already a big leap forward for most transporters, but a Grid allows more than that:  to re-optimize the allocation of transportation tasks to vehicles every time that a quotation for a new one has to be produced, thus calculating the lowest possible price for each offer

6 Trust and Security for Next Generation Grids, www.gridtrust.eu The Transporters’ Association Grid Users Users  Transporters Service Providers Service Providers  3 rd parties, e.g. Utility computing vendors Managing Application Managing Application  TAportal, used by Transporters’ Association Computing Application Computing Application  TAportal used by Transporters to submit computational jobs Supporting software Supporting software  An implementation of Operational Research optimization algorithms (VrpSolve library)  A standard format for representing the problem’s input/output data  Example optimizer application

7 Trust and Security for Next Generation Grids, www.gridtrust.eu Agenda Business context / Grid proposal Business context / Grid proposal Solving the Vehicle Routing Problem Solving the Vehicle Routing Problem Security issues / GridTrust solution Security issues / GridTrust solution Architecture Architecture Future evolution Future evolution

8 Trust and Security for Next Generation Grids, www.gridtrust.eu The Vehicle Routing Problem (VRPTW) input data A fleet of M vehicles of capacity C A fleet of M vehicles of capacity C A central depot with coordinates (x 0, y 0 ) A central depot with coordinates (x 0, y 0 ) A list of N transportation tasks, where each task T i is defined by: A list of N transportation tasks, where each task T i is defined by:  Destination vertex v i with coordinates (x i, y i )  Quantity q i of goods to be delivered  Time window (r i, d i ) within which the node should be served  r i defines the ready time or start time  d i defines the due date or end time  Service time s i for unloading goods

9 Trust and Security for Next Generation Grids, www.gridtrust.eu VRPTW problem and goal Can be formulated as a mathematical programming problem: objective function + constraints Can be formulated as a mathematical programming problem: objective function + constraints Problem: find a set of NV vehicle routes, originating from and terminating at the depot, such that Problem: find a set of NV vehicle routes, originating from and terminating at the depot, such that  Each vehicle services one route  Each vertex v i i=1..N is visited only once  Quantity of goods on each vehicle never exceeds its capacity C  Start time of each route is >= r 0  End time of each route is <= d 0  Time of beginning of service at vertex i is >= r i  If arrival time t i at vertex i is < r i then the vehicle waits for a waiting time w i = (r i - t i )  Time of ending of service at vertex i is <= d i Goal: minimize NV and then the total distance TD Goal: minimize NV and then the total distance TD Complexity: NP-hard (for optimal solution) Complexity: NP-hard (for optimal solution) Benchmark problems of size up to 100 customers have been proposed [Solomon 1987] Benchmark problems of size up to 100 customers have been proposed [Solomon 1987]

10 Trust and Security for Next Generation Grids, www.gridtrust.eu Example: Solomon benchmark R103 VEHICLE NUMBER CAPACITY 25 200 25 200CUSTOMER CUST NO. XCOORD. YCOORD. DEMAND READY TIME DUE DATE SERVICE TIME 0 35 35 0 0 230 0 0 35 35 0 0 230 0 1 41 49 10 0 204 10 1 41 49 10 0 204 10 2 35 17 7 0 202 10 2 35 17 7 0 202 10 3 55 45 13 0 197 10 3 55 45 13 0 197 10 4 55 20 19 149 159 10 4 55 20 19 149 159 10 5 15 30 26 0 199 10 5 15 30 26 0 199 10 6 25 30 3 99 109 10 6 25 30 3 99 109 10 7 20 50 5 0 198 10 7 20 50 5 0 198 10 8 10 43 9 95 105 10 8 10 43 9 95 105 10 9 55 60 16 97 107 10 9 55 60 16 97 107 10 10 30 60 16 124 134 10 10 30 60 16 124 134 10 11 20 65 12 67 77 10 11 20 65 12 67 77 10 12 50 35 19 0 205 10 12 50 35 19 0 205 10 13 30 25 23 159 169 10 13 30 25 23 159 169 10 14 15 10 20 0 187 10 14 15 10 20 0 187 10 15 30 5 8 61 71 10 15 30 5 8 61 71 10 16 10 20 19 0 190 10 16 10 20 19 0 190 10 17 5 30 2 157 167 10 17 5 30 2 157 167 10 18 20 40 12 0 204 10 18 20 40 12 0 204 10 19 15 60 17 0 187 10 19 15 60 17 0 187 10 20 45 65 9 0 188 10 20 45 65 9 0 188 10 21 45 20 11 0 201 10 21 45 20 11 0 201 10 22 45 10 18 97 107 10 22 45 10 18 97 107 10 23 55 5 29 68 78 10 23 55 5 29 68 78 10 24 65 35 3 0 190 10 24 65 35 3 0 190 10 25 65 20 6 172 182 10 25 65 20 6 172 182 10

11 Trust and Security for Next Generation Grids, www.gridtrust.eu MACS - Multiple Ants Colony Systems MACS-VRPTW algorithm [Gambardella et al 1999] allows multi-objective optimization MACS-VRPTW algorithm [Gambardella et al 1999] allows multi-objective optimization Algorithm defines two ant colonies, ACS-TIME and ACS-VEI Algorithm defines two ant colonies, ACS-TIME and ACS-VEI Each ants colony is dedicated to optimizing a different objective function Each ants colony is dedicated to optimizing a different objective function  ACS-VEI minimizes the number of vehicles  ACS-TIME minimizes the total travel time (cost) The two ants colonies cooperate exchanging information through the update of a single pheromone matrix The two ants colonies cooperate exchanging information through the update of a single pheromone matrix Number of vehicles minimization takes precedence over travel time minimization (when comparing solutions) Number of vehicles minimization takes precedence over travel time minimization (when comparing solutions)

12 Trust and Security for Next Generation Grids, www.gridtrust.eu R103 routes The strange rings / butterfly wings are due to the need to avoid or minimize waiting time in nodes where the goods are not yet ready

13 Trust and Security for Next Generation Grids, www.gridtrust.eu Ants Colony System algorithms Ant Colony Algorithms are inspired by observation of real ants [Dorigo Maniezzo Colorni 1991] Ant Colony Algorithms are inspired by observation of real ants [Dorigo Maniezzo Colorni 1991] Real ants are insects organized in colonies Real ants are insects organized in colonies Ants search for food by parallel exploration of the environment Ants search for food by parallel exploration of the environment Ants coordinate their activity by an indirect form of communication based on pheromone laying Ants coordinate their activity by an indirect form of communication based on pheromone laying Ants follow pheromone trails and lay more of it on their way Ants follow pheromone trails and lay more of it on their way

14 Trust and Security for Next Generation Grids, www.gridtrust.eu How ants find food Ants explore the environment randomly while laying pheromone on their trail Ants explore the environment randomly while laying pheromone on their trail When an ant finds food it follows its own pheromone trail back to the nest while laying more pheromone on the trail When an ant finds food it follows its own pheromone trail back to the nest while laying more pheromone on the trail Other ants crossing the reinforced trail follow it and lay even more pheromone Other ants crossing the reinforced trail follow it and lay even more pheromone

15 Trust and Security for Next Generation Grids, www.gridtrust.eu How ants optimize the nest-food path More than one path may be found from nest to food More than one path may be found from nest to food The shortest path receives more pheromone and more frequently The shortest path receives more pheromone and more frequently Thus sooner or later all the ants follow the shortest path Thus sooner or later all the ants follow the shortest path

16 Trust and Security for Next Generation Grids, www.gridtrust.eu Agenda Business context / Grid proposal Business context / Grid proposal Solving the Vehicle Routing Problem Solving the Vehicle Routing Problem Security issues / GridTrust solution Security issues / GridTrust solution Architecture Architecture Future evolution Future evolution

17 Trust and Security for Next Generation Grids, www.gridtrust.eu Security Issues By default, in a business environment, Users and Service Providers By default, in a business environment, Users and Service Providers  Don’t KNOW each other  Don’t TRUST each other The Transporter Association must The Transporter Association must  Ensure that only its members use the Grid resources  Guarantee a secure environment for competing transporters using the same resources  Guarantee Service Providers that their security policies will not be violated by Grid (transporters) users A B C

18 Trust and Security for Next Generation Grids, www.gridtrust.eu GridTrust Solution Ensure that only TA members use the Grid resources Ensure that only TA members use the Grid resources  TA members form a Virtual Organization Guarantee a secure environment for competing transporters using the same resources Guarantee a secure environment for competing transporters using the same resources  Select only (Grid)Trusted SPs which have suitable security policies Guarantee SPs that their security policies will not be violated by Grid users Guarantee SPs that their security policies will not be violated by Grid users  Usage Control Service enforces SP policies A B C

19 Trust and Security for Next Generation Grids, www.gridtrust.eu Secure VO Operation: granting access to services VO Service 1 Denied Service 2 Non-VO user VO user SP1 Service 1 OK SP2 PKI A

20 Trust and Security for Next Generation Grids, www.gridtrust.eu Secure VO Operation: selecting secure services VO Manager VO SR B Select SPs SP1 SP2 Join VO Search SPs Register VBE Manager B

21 Trust and Security for Next Generation Grids, www.gridtrust.eu Secure VO Operation: usage control TRS VO Application 2 VO user SP1 Application 1 Denied OK SP2 Applications can open the HP libs if the user reputation is > 0.7 Applications can open files only in the user home directory C

22 Trust and Security for Next Generation Grids, www.gridtrust.eu Agenda Business context / Grid proposal Business context / Grid proposal Solving the Vehicle Routing Problem Solving the Vehicle Routing Problem Security issues / GridTrust solution Security issues / GridTrust solution Scenario / Architecture Scenario / Architecture Future evolution Future evolution

23 Trust and Security for Next Generation Grids, www.gridtrust.eu Scenario Transporters’ Association (TA) Administrator sets up TA Grid Portal and VO Transporters’ Association (TA) Administrator sets up TA Grid Portal and VO  Create VO  Select and add Computational providers  Add VO users A good transporter A good transporter  Submitting jobs to solve routing problem A malicious transporter A malicious transporter  Trying to steal data from competitors  Trying to steal data from providers

24 Trust and Security for Next Generation Grids, www.gridtrust.eu What if a bad transporter wants to steal data from competitors? Transporters using the same Grid services are in competition between them Transporters using the same Grid services are in competition between them All transporters are interested in competitors’ data, so let’s suppose that one of them wants to play bad All transporters are interested in competitors’ data, so let’s suppose that one of them wants to play bad The bad transporter writes an application (BadApp01) which tries to steal data of sibling applications in execution on the same Grid computational node The bad transporter writes an application (BadApp01) which tries to steal data of sibling applications in execution on the same Grid computational node The starting idea is that data for all calculations on the same node are hosted in temporary directories under the same root The starting idea is that data for all calculations on the same node are hosted in temporary directories under the same root BadApp01 so tries to navigate in sibling directories and pack all their contents in a single jar which will be then sent back as the application output, but… BadApp01 so tries to navigate in sibling directories and pack all their contents in a single jar which will be then sent back as the application output, but… …UCON policies of the computational node don’t allow it! …UCON policies of the computational node don’t allow it!

25 Trust and Security for Next Generation Grids, www.gridtrust.eu What if a bad transporter wants to steal data from providers? Routing optimization algorithm ideally uses a map, which has an associated DT matrix giving Distance (or Time) between any pair of locations Routing optimization algorithm ideally uses a map, which has an associated DT matrix giving Distance (or Time) between any pair of locations Solution precision depends on the quality of the DT matrix data Solution precision depends on the quality of the DT matrix data DT matrix (map) data is precious and local to each SP DT matrix (map) data is precious and local to each SP SPs make money from DT matrix data and allow clients to access it only after payment of a fee SPs make money from DT matrix data and allow clients to access it only after payment of a fee Reselling DT matrix data is prohibited by the license agreement Reselling DT matrix data is prohibited by the license agreement The bad transporter writes an application (BadApp02) which tries to steal DT matrix data and make it available over the net, with the idea of reselling it The bad transporter writes an application (BadApp02) which tries to steal DT matrix data and make it available over the net, with the idea of reselling it BadApp02 is built as a web server, accepting connections from Internet clients and providing DT matrix data as answer to requests, but… BadApp02 is built as a web server, accepting connections from Internet clients and providing DT matrix data as answer to requests, but… …UCON policies of the computational node don’t allow it! …UCON policies of the computational node don’t allow it!

26 Trust and Security for Next Generation Grids, www.gridtrust.eu Architecture TA portal / VOM operated by VO admin TA portal / VOM operated by VO admin VO user VO user Computational providers (GRAM+UCON) Computational providers (GRAM+UCON) VBE Manager + CA VBE Manager + CA SRB + TRS + PPM SRB + TRS + PPM Graphical Reputation Monitor Graphical Reputation Monitor

27 Trust and Security for Next Generation Grids, www.gridtrust.eu Service Deployment for the Supply Chain Demo SRB C-UCON VO MGT GridTrust CA TRS PPM

28 Trust and Security for Next Generation Grids, www.gridtrust.eu Libraries GRAM UCON Libraries GRAM UCON VBEM GRAM SP registr register create VO SearchSP SelectSP SRB PPM TR VO User SearchSP JoinVO JoinUserToVO Transporter Association Portal VO library VOM Submit job JoinSPToVO JoinVBE TR Monitor GUI VO Admin create VO JoinUserToVO JoinSPToVO CA Java Appl DATA Feedback

29 Trust and Security for Next Generation Grids, www.gridtrust.eu Agenda Business context / Grid proposal Business context / Grid proposal Solving the Vehicle Routing Problem Solving the Vehicle Routing Problem Security issues / GridTrust solution Security issues / GridTrust solution Architecture Architecture Future evolution Future evolution

30 Trust and Security for Next Generation Grids, www.gridtrust.eu Future evolution of the scenario Auctioning system Auctioning system Transporter’s automated bidding system Transporter’s automated bidding system  Get new task from each auction  Add task to current task list  Re-route whole fleet  Calculate incremental cost  Produce bid N transporters in parallel N transporters in parallel To give a sample size to the scenario imagine: To give a sample size to the scenario imagine:  10 producers create an auction for each of their  50 daily transportation tasks  30 transporters that bid on every auction  it is 500 auctions per day (nearly one every minute in working hours), spawning 15.000 jobs of routing optimization every day

31 Trust and Security for Next Generation Grids, www.gridtrust.eu Auction based supply chain Fist-Price Sealed-Bid reverse auction model Fist-Price Sealed-Bid reverse auction model Producers (auction proponents) produce RfQs for transportation tasks Producers (auction proponents) produce RfQs for transportation tasks Transporters can recalculate routing exploiting routing computational services running on Grid resources Transporters can recalculate routing exploiting routing computational services running on Grid resources Auctioning system’s offers selection is based on customer requirements: best time / lowest price / transporter’s reputation / a combination of the above Auctioning system’s offers selection is based on customer requirements: best time / lowest price / transporter’s reputation / a combination of the above Producers create a Delivery VO (auction and delivery management) Producers create a Delivery VO (auction and delivery management) Transporters use Routing VO to compute best routes for answering the auction Transporters use Routing VO to compute best routes for answering the auction

32 Trust and Security for Next Generation Grids, www.gridtrust.eu Thanks! For more information please contact: Lorenzo Blasi - HP Italy Innovation Center lorenzo.blasi@hp.com


Download ppt "Trust and Security for Next Generation Grids, www.gridtrust.eu Usage Control in Action: Controlling Resource Usage in a Grid-Based Supply Chain Lorenzo."

Similar presentations


Ads by Google