期刊文献+

一种基于移动Agent的云端计算任务安全分割与分配算法 被引量:2

Security segmentation and allocation algorithm based on mobile Agent for cloud computing task
下载PDF
导出
摘要 为了让在云端计算环境中运行的计算任务机密和隐私得到保障,避免恶意节点或竞争对手窥视任务的内部结构、系统逻辑和任务目标,必须构建一种全新的基于移动Agent的云端计算任务安全分割与分配算法。这种算法不仅要结合集群服务器节点的计算能力和特征,还要将用户终端节点的相关方面也考虑进去,把整个大的任务合理地分割成若干子任务,并将移动Agent作为这些子任务的数据结构和代码构成的载体;然后把这些数据和代码分配到与之对应的合理的任务执行节点上进行工作。通过将实验原型系统和该算法结合起来进行性能分析与探索,证明该算法对执行子任务的终端节点安全性的保障具有较强的有效性,即便有恶意节点窥探到了分配给该任务执行节点的数据和代码,甚至联合起来对系统进行攻击,也不会对这个任务的总体执行思路和整体目标的安全性造成威胁。 To guarantee the confidentiality and privacy of computing tasks operated in cloud computing environment,and avoid the malicious nodes or the competitors peering the internal structure,system logic and task objects,a new security segmentation and allocation algorithm of cloud computing task based on mobile Agent needs to be constructed. This algorithm combines with the computing ability and characteristics of cluster server nodes,and the relevant aspects of the user terminal nodes are taken into account. The entire task is segmented into some sub-task effectively,then the mobile Agent is taken as the carrier of data structure and code structure of the sub-task. The data and codes are allocated to reasonable task execution nodes corresponding to them. The performance is analyzed and explored by combining with experimental prototype system and this algorithm. It proved that the algorithm has better validity to guarantee the terminal nodes security of executing sub-task. When the malicious nodes peered the data and codes allocated to the task execution nodes,even the malicious nodes are combined together to attack on the system,it can not threaten the overall execution thought of the task and the security of the entire object.
作者 倪斌 李红兰
出处 《现代电子技术》 北大核心 2015年第17期89-92,共4页 Modern Electronics Technique
关键词 移动AGENT技术 云端计算 隐私安全 分割与分配算法 mobile Agent technology cloud computing privacy security segmentation and allocation algorithm
  • 相关文献

参考文献9

二级参考文献167

  • 1赵丽,王凤先,刘振鹏,常卓.计算机免疫系统中沙盒主机的构建[J].大连理工大学学报,2003,43(z1):9-11. 被引量:5
  • 2刘正伟,文中领,张海涛.云计算和云数据管理技术[J].计算机研究与发展,2012,49(S1):26-31. 被引量:170
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.

共引文献1897

同被引文献16

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部