现代电子技术
現代電子技術
현대전자기술
Modern Electronics Technique
2015年
17期
89-92
,共4页
移动Agent技术%云端计算%隐私安全%分割与分配算法
移動Agent技術%雲耑計算%隱私安全%分割與分配算法
이동Agent기술%운단계산%은사안전%분할여분배산법
mobile Agent technology%cloud computing%privacy security%segmentation and allocation algorithm
为了让在云端计算环境中运行的计算任务机密和隐私得到保障,避免恶意节点或竞争对手窥视任务的内部结构、系统逻辑和任务目标,必须构建一种全新的基于移动Agent的云端计算任务安全分割与分配算法.这种算法不仅要结合集群服务器节点的计算能力和特征,还要将用户终端节点的相关方面也考虑进去,把整个大的任务合理地分割成若干子任务,并将移动Agent作为这些子任务的数据结构和代码构成的载体;然后把这些数据和代码分配到与之对应的合理的任务执行节点上进行工作.通过将实验原型系统和该算法结合起来进行性能分析与探索,证明该算法对执行子任务的终端节点安全性的保障具有较强的有效性,即便有恶意节点窥探到了分配给该任务执行节点的数据和代码,甚至联合起来对系统进行攻击,也不会对这个任务的总体执行思路和整体目标的安全性造成威胁.
為瞭讓在雲耑計算環境中運行的計算任務機密和隱私得到保障,避免噁意節點或競爭對手窺視任務的內部結構、繫統邏輯和任務目標,必鬚構建一種全新的基于移動Agent的雲耑計算任務安全分割與分配算法.這種算法不僅要結閤集群服務器節點的計算能力和特徵,還要將用戶終耑節點的相關方麵也攷慮進去,把整箇大的任務閤理地分割成若榦子任務,併將移動Agent作為這些子任務的數據結構和代碼構成的載體;然後把這些數據和代碼分配到與之對應的閤理的任務執行節點上進行工作.通過將實驗原型繫統和該算法結閤起來進行性能分析與探索,證明該算法對執行子任務的終耑節點安全性的保障具有較彊的有效性,即便有噁意節點窺探到瞭分配給該任務執行節點的數據和代碼,甚至聯閤起來對繫統進行攻擊,也不會對這箇任務的總體執行思路和整體目標的安全性造成威脅.
위료양재운단계산배경중운행적계산임무궤밀화은사득도보장,피면악의절점혹경쟁대수규시임무적내부결구、계통라집화임무목표,필수구건일충전신적기우이동Agent적운단계산임무안전분할여분배산법.저충산법불부요결합집군복무기절점적계산능력화특정,환요장용호종단절점적상관방면야고필진거,파정개대적임무합리지분할성약간자임무,병장이동Agent작위저사자임무적수거결구화대마구성적재체;연후파저사수거화대마분배도여지대응적합리적임무집행절점상진행공작.통과장실험원형계통화해산법결합기래진행성능분석여탐색,증명해산법대집행자임무적종단절점안전성적보장구유교강적유효성,즉편유악의절점규탐도료분배급해임무집행절점적수거화대마,심지연합기래대계통진행공격,야불회대저개임무적총체집행사로화정체목표적안전성조성위협.
To guarantee the confidentiality and privacy of computing tasks operated in cloud computing environment,and avoid the malicious nodes or the competitors peering the internal structure,system logic and task objects,a new security seg-mentation and allocation algorithm of cloud computing task based on mobile Agent needs to be constructed. This algorithm com-bines with the computing ability and characteristics of cluster server nodes,and the relevant aspects of the user terminal nodes are taken into account. The entire task is segmented into some sub-task effectively,then the mobile Agent is taken as the carrier of data structure and code structure of the sub-task. The data and codes are allocated to reasonable task execution nodes corre-sponding to them. The performance is analyzed and explored by combining with experimental prototype system and this algo-rithm. It proved that the algorithm has better validity to guarantee the terminal nodes security of executing sub-task. When the malicious nodes peered the data and codes allocated to the task execution nodes,even the malicious nodes are combined together to attack on the system,it can not threaten the overall execution thought of the task and the security of the entire object.