期刊文献+

开放云端计算环境中的任务执行代码安全机制 被引量:2

Code Execution Security Mechanism for Open Cloud & Client Computing
下载PDF
导出
摘要 云端计算可以充分聚合Internet网络服务器端和边缘终端节点的计算资源来获得更大的效益。但将计算任务部署到用户终端上执行却带来了安全隐患。分属于不同用户的海量终端节点之行为显然不可靠,计算安全性也难以保障。特别是作为任务执行者的用户终端节点可能篡改任务中的程序代码或数据,返回的是虚假的结果,或是窥探有私密性要求的代码和数据。提出一种新的基于内嵌验证码的加密函数的代码保护机制,它可同时满足计算完整性和私密性,能够有效验证返回结果的正确性,并保障计算代码不被窥知。为了进一步提高任务执行的成功率和缩短作业周转时间,将任务代码优先分发给信誉良好且执行成功率高的节点来执行。还提出了一种评估任务执行节点可信性的方法。具体描述了任务执行代码保护机制的实现流程,并对机制的性能进行了详细的分析与验证。 The cloud & client computing can take full aggregation of network server-side and edge node computing re- sources of Internet to gain greater benefits. However, deploying tasks to terminal nodes would bring the corresponding security risks at the same time. The behaviors of terminal nodes belonging to different users are clearly not reliable, which means the computing security is difficult to guarantee. One of these security risks is that a terminal node working as the task executor may tamper with the program or data of the task, and return the fake result, or pry into the code and data with privacy requirement. This paper presented a new code protection mechanism based on encryption function with verification code meeting integrity and privacy both, which makes it possible to effectively verify the correctness of returned results and to guarantee the code not be spied. In order to improve the success rate of task implementation fur- ther and reduce job cycle time, tasks ought to be distributed to those nodes with good reputations and high success rate of task implementation to execute. This paper proposed the credibility evaluation of node, described the work procedure of the code protection mechanism and gave the analysis and verification of the security performance of the system in detail.
出处 《计算机科学》 CSCD 北大核心 2012年第7期7-10,共4页 Computer Science
基金 国家自然科学基金项目(60873231) 国家教育部高等学校博士学科点专项科研基金课题(20093223120001) 中国博士后科学基金项目(2011M500095) 江苏省科技支撑计划(BE2009158) 江苏省自然科学基金(BK2011754 BK2009426) 信息安全国家重点实验室开放课题(03-01-1) 江苏省高校自然科学研究项目(09KJB520010) 江苏高校优势学科建设工程项目(yx002001)资助
关键词 云计算 信息安全 代码保护 可信评估 Cloud computing, Information security, Code protection, Credibility evaluation
  • 相关文献

参考文献9

  • 1陈康,郑纬民.云计算:系统实例与研究现状[J].软件学报,2009,20(5):1337-1348. 被引量:1310
  • 2Barroso L A, Dean J, H61zle U. Web search for a planet: The Google cluster architecture[J]. IEEE Micro, 2003,23 (2) : 22 28.
  • 3Chang F, Dean J, Ghemawat S, et al. Bigtable: A distributed storage system for structured dataC//Proc, of the 7th USE NIX Symp. on Operating Systems Design and Implementation. Berkeley: USENIX Association, 2006 205-218.
  • 4Dean J, Ghemawat S. Distributed programming with Mapreduce M//Oram A, Wilson G, eds. Beautiful Code. Sehastopol O Reilly Media, Inc. , 2007 : 371-384.
  • 5徐小龙,程春玲,熊婧夷.基于multi-agent的云端计算融合模型的研究[J].通信学报,2010,31(10):203-211. 被引量:17
  • 6Fritz H. Time limited blackbox security: Protecting mobile a- gents from malicious hosts[C]//Vigna G, ed. Mobile Agents and Security, LNCS 1419. New York: Springer-Verlag, 1998 ; 92- 113.
  • 7Sander T, Tschudin C F. Protecting Mobile Agents Against Ma- licious Hosts[C]//Vigna G, ed. Mobile Agents and Security, LNCS 1419. New York: Springer-Verlag, 1998 : 44-60.
  • 8窦文,王怀民,贾焰,邹鹏.构造基于推荐的Peer-to-Peer环境下的Trust模型[J].软件学报,2004,15(4):571-583. 被引量:325
  • 9Kamvar S D, Schlosser M T. EigenRep: Reputation management in P2P networks[C]//Proc, of the 12th International World Wide Web Conf. Budapest: ACM Press, 2003 : 123-134.

二级参考文献45

  • 1盛秋戬,赵志崑,刘少辉,史忠植.多主体团队交互协议[J].软件学报,2004,15(5):689-696. 被引量:15
  • 2Sims K. IBM introduces ready-to-use cloud computing collaboration services get clients started with cloud computing. 2007. http://www-03.ibm.com/press/us/en/pressrelease/22613.wss
  • 3Boss G, Malladi P, Quan D, Legregni L, Hall H. Cloud computing. IBM White Paper, 2007. http://download.boulder.ibm.com/ ibmdl/pub/software/dw/wes/hipods/Cloud_computing_wp_final_8Oct.pdf
  • 4Zhang YX, Zhou YZ. 4VP+: A novel meta OS approach for streaming programs in ubiquitous computing. In: Proc. of IEEE the 21st Int'l Conf. on Advanced Information Networking and Applications (AINA 2007). Los Alamitos: IEEE Computer Society, 2007. 394-403.
  • 5Zhang YX, Zhou YZ. Transparent Computing: A new paradigm for pervasive computing. In: Ma JH, Jin H, Yang LT, Tsai JJP, eds. Proc. of the 3rd Int'l Conf. on Ubiquitous Intelligence and Computing (UIC 2006). Berlin, Heidelberg: Springer-Verlag, 2006. 1-11.
  • 6Barroso LA, Dean J, Holzle U. Web search for a planet: The Google cluster architecture. IEEE Micro, 2003,23(2):22-28.
  • 7Brin S, Page L. The anatomy of a large-scale hypertextual Web search engine. Computer Networks, 1998,30(1-7): 107-117.
  • 8Ghemawat S, Gobioff H, Leung ST. The Google file system. In: Proc. of the 19th ACM Symp. on Operating Systems Principles. New York: ACM Press, 2003.29-43.
  • 9Dean J, Ghemawat S. MapReduce: Simplified data processing on large clusters. In: Proc. of the 6th Symp. on Operating System Design and Implementation. Berkeley: USENIX Association, 2004. 137-150.
  • 10Burrows M. The chubby lock service for loosely-coupled distributed systems. In: Proc. of the 7th USENIX Symp. on Operating Systems Design and Implementation. Berkeley: USENIX Association, 2006. 335-350.

共引文献1646

同被引文献45

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部