tailieunhanh - Báo cáo " Security of information processing based on grid environment "

Grid computing architecture was defined to be a complete physical layer. Based on the grid computing architecture, we divided grid nodes into supervisor grid node and execute grid nod. The data transfer in network must be in secure. In this study, we propose the encryption and decryption algorithm in each grid node to keep information processing in security. We create user information database both in supervisor and execute grid nodes. We use them to verify user processing in system. | VNU Journal of Science Natural Sciences and Technology 24 2008 170-178 Security of information processing based on grid environment Huey-Ming Lee1 Tsang-Yean Lee1 Lily Lin2 department of Information Management Chinese Culture University 55 Hwa-Kung Road Yang-Ming-San Taipei 11114 Taiwan department of International Business China University of Technology 56 Sec. 3 Hsing-Lung Road Taipei 116 Taiwan . Received 11 November 2007 received in revised form 20 November 2007 Abstract. Grid computing architecture was defined to be a complete physical layer. Based on the grid computing architecture we divided grid nodes into supervisor grid node and execute grid nod. The data transfer in network must be in secure. In this study we propose the encryption and decryption algorithm in each grid node to keep information processing in security. We create user information database both in supervisor and execute grid nodes. We use them to verify user processing in system. When these algorithms install in all grid nodes we can keep processing be secure in all system. Keywords Decryption algorithm Encryption algorithm Grid computing Security 1. Introduction The term Grid was coined in the mid 1990s to denote a proposed distributed computing infrastructure for advanced science and engineering 1 . In grid environment users may access the computational resources at many sites 2 . Lee et al. 3 proposed a dynamic supervising model which can utilize the grid resources . CPU storages etc. more flexible and optimal. Lee et al. 4 5 proposed a dynamic analyzing resources model which can receive the information about CPU usages number of running jobs of each grid Corresponding author. E-mail hmlee@ node resource to achieve load-balancing and make the plans and allocations of the resources of collaborated nodes optimize. In general the functions of security system are security authenticity integrity nonrepudiation data confidentiality and access control 6-9 . Rivest et al. 10

TỪ KHÓA LIÊN QUAN