TAILIEUCHUNG - Báo cáo " Security of information processing based on grid environment "

Grid computing architecture was defined to be a complete physical layer. Based on the grid computing architecture, we divided grid nodes into supervisor grid node and execute grid nod. The data transfer in network must be in secure. In this study, we propose the encryption and decryption algorithm in each grid node to keep information processing in security. We create user information database both in supervisor and execute grid nodes. We use them to verify user processing in system. | VNU Journal of Science Natural Sciences and Technology 24 2008 170-178 Security of information processing based on grid environment Huey-Ming Lee1 Tsang-Yean Lee1 Lily Lin2 department of Information Management Chinese Culture University 55 Hwa-Kung Road Yang-Ming-San Taipei 11114 Taiwan department of International Business China University of Technology 56 Sec. 3 Hsing-Lung Road Taipei 116 Taiwan . Received 11 November 2007 received in revised form 20 November 2007 Abstract. Grid computing architecture was defined to be a complete physical layer. Based on the grid computing architecture we divided grid nodes into supervisor grid node and execute grid nod. The data transfer in network must be in secure. In this study we propose the encryption and decryption algorithm in each grid node to keep information processing in security. We create user information database both in supervisor and execute grid nodes. We use them to verify user processing in system. When these algorithms install in all grid nodes we can keep processing be secure in all system. Keywords Decryption algorithm Encryption algorithm Grid computing Security 1. Introduction The term Grid was coined in the mid 1990s to denote a proposed distributed computing infrastructure for advanced science and engineering 1 . In grid environment users may access the computational resources at many sites 2 . Lee et al. 3 proposed a dynamic supervising model which can utilize the grid resources . CPU storages etc. more flexible and optimal. Lee et al. 4 5 proposed a dynamic analyzing resources model which can receive the information about CPU usages number of running jobs of each grid Corresponding author. E-mail hmlee@ node resource to achieve load-balancing and make the plans and allocations of the resources of collaborated nodes optimize. In general the functions of security system are security authenticity integrity nonrepudiation data confidentiality and access control 6-9 . Rivest et al. 10

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.