« Home « Kết quả tìm kiếm

Security of information processing based on grid environment


Tóm tắt Xem thử

- Based on the grid computing architecture, we divided grid nodes into supervisor grid node and execute grid nod.
- In this study, we propose the encryption and decryption algorithm in each grid node to keep information processing in security.
- We create user information database both in supervisor and execute grid nodes.
- [4, 5] proposed a dynamic analyzing resources model which can receive the information about CPU usages, number of running jobs of each grid node resource to achieve load-balancing and make the plans and allocations of the resources of collaborated nodes optimize..
- In this paper, we propose the method to send information to other execute grid nodes through supervisor grid node.
- We also propose encryption algorithm to encrypt information to produce cipher text and send it to supervisor.
- Supervisor uses sender format code to decrypts the cipher text to produce information.
- Once supervisor has checked, it uses received format code to encrypt information to produce cipher text and sends to the received execute grid node.
- The received execute grid node uses decryption algorithm to produce original information.
- The information is sent from one execute grid node to other execute grid node.
- We send information to supervisor grid node to check and verify.
- When it is correct, we send information to received executed grid node.
- The information is encrypted to produce cipher text and to be sent.
- When cipher text has received, we decrypt to produce original information.
- Execute grid node.
- In the execute grid nodes, they have the following operations to do:.
- When the execute grid node signs on first time, it uses default format code to encrypt user-id and password and sends to supervisor grid node.
- It receives format code from supervisor and saves to create EUIDB (Execute User Information Data Base).
- EUIDB (Execute User Information Data Base) User-id.
- Format code.
- When user wants to send information, it uses format code in EUIDB to encryption user-id and password.
- When supervisor returns correct, it can send information to users..
- 2) Request permission from supervisor When he wants to send information to other users, he inputs user-id and password to get permission from supervisor.
- We use format code in EUIDB to encrypt password and send to supervisor to process..
- When user wants to delete entry in supervisor, he inputs user-id and password.
- We use format code in EUIDB to encrypt password and send to supervisor to process and delete the entry in EUIDB.
- 5) Send information to user in other execute grid node.
- When he wants to send information to other user, he types user-id, received-user-id and information.
- We use format code in EUIDB to encrypt received-user-id and information to produce cipher text and send to supervisor to process..
- 6) Receive information from supervisor grid node.
- When it receives cipher text from supervisor, it uses format code to decrypt cipher text to get information..
- 7) Exit from supervisor grid node.
- When user wants to log out, it sends user-id to supervisor..
- Supervisor grid node.
- When the new user signs on, it receives cipher text.
- It uses default format code to decrypt cipher text to get user-id and password.
- It uses user-id as key to access supervisor user information data base.
- If user exists and returns error code, otherwise he assigns a format code to user and creates an entry in the SUIDB (supervisor user information data base) as Table 2 and return format code.
- User-id.
- Format Code.
- It receives the cipher text and uses use-id as key to find the format code in the SUIDB.
- It uses this format code to decrypt cipher text to get password.
- When it receives the cipher text of information, it uses user-id as key to find the format code in the RUIDB.
- If the user-id does not exist, it will return error code and exist.
- It uses the format code to decrypt cipher text to find received-user-id and information.
- It uses receive-user-id as key to find the format code of this received-user-id.
- It uses format code of received-user-id to encrypt user-id and information to produce cipher text.
- It sends the cipher text to received-user-id.
- When it receives return message from received-user-id, it uses the user-id as key to find the format code and decrypt to find original user-id and message.
- It uses the format code of original user-id to encrypt message to produce cipher text and return to original user.
- Based on the grid computing architecture, we divide grid nodes into supervisor grid node (S0) and execute grid node (Xi).
- We also present the supervisor information process module (SIPM) on the supervisor grid node, execute information process module (EIPM) on the execute grid node, as shown in Fig.
- We present the supervisor information process module (SIPM) on the supervisor grid node.
- SRIC receives information from the execute grid node.
- It calls information decryption component (IDC) to decrypt cipher text to get information.
- SPIC processes the request of execute grid nodes.
- Use user-id as key to check SUIDB (Supervisor User Information Data Base).
- If user-id exists, it will return error code and exit.
- If user-id does not exist, it creates an entry with user-id, password and new format code in SUIDB and returns format code.
- We check user-id and password in SUIDB.
- We change password in SUIDB and store new format code and return format code.
- We delete user-id in SUIDB and return message.
- We use received-user-id as key to check in SUIDB.
- If it does not exist, it will return error code and exits.
- It uses format code of received-ser-id to call IEC to encrypt information to produce cipher text and send to received-user-id..
- SSIC sends information to grid node..
- Execute grid node We present the execute information process module (EIPM) on the execute grid node in this section.
- EPUIC processes to send user information to supervisor.
- Set code as N and type user-id and password.
- Set code as P and type user-id and password.
- (4) Send information.
- Set code as S and type user-id, received-user-id and information.
- Set code E and type user-id to exit from supervisor..
- In (1), we use default format code.
- We call IEC (Information Encryption Component) to encryption information to produce cipher text.
- IDC uses format code to decrypt cipher text to get information.
- Receive format code and store to EUIDB (Execute User Information Data Base).
- Cipher Text.
- The length of symbol table is N+M.
- Get symbol table after rotation (STAR).
- (2) Build background symbol table (BST) Step 1: Reserve table Set S to format code.
- (3) Build cipher text.
- From format code, we store SC, STAC and CBT to BST and BST is cipher text..
- We may define some value of format code as showing Table 6..
- The format of sending message has fields as Code, User-id and cipher text..
- Shift the symbol table.
- Before decryption, we should know the values S of format code in execute user information data base and U (length of user-id +1 (Code.
- Contents of format code and cipher text.
- Cipher text Content 1.
- The length of symbol table N=1/2*(L-S-U).
- From different format code and above values, we can get SC, STAC and CBT..
- Step 1: Get from cipher text (CT).
- a) To do the encryption, we must know format code to produce cipher text.
- b) Each cipher text may have different length and format because it has different format code and the length of dummy symbol table..
- c) To do decryption, we must know format code, shift count and different format to decrypt cipher text to plaintext.
- d) The proposed algorithm in this study is more difficult to cryptanalysis, because the following fields of each transaction have different value in the cipher text..
- Miyaguchi, “The FEAL-8 Cryptosystem and Call for Attack,” Advances in Cryptology-CRYPTO’89 proceedings, Springer-Verlag .
- Supervisor Grid Node (S0).
- Execute Grid Node (Xk).
- Execute Grid Node (Xi).
- Execute Grid Node (Xj) X2