Computer Science ›› 2012, Vol. 39 ›› Issue (7): 7-10.
Previous Articles Next Articles
Online:
Published:
Abstract: The cloud & client computing can take full aggregation of network server-side and edge node computing resources of Internet to gain greater benefits. However, deploying tasks to terminal nodes would bring the corresponding security risks at the same time. The behaviors of terminal nodes belonging to different users are clearly not reliable,which means the computing security is difficult to guarantee. One of these security risks is that a terminal node working as the task executor may tamper with the program or data of the task, and return the fake result, or pry into the code and data with privacy requirement. hhis paper presented a new code protection mechanism based on encryption function with verification code meeting integrity and privacy both,which makes it possible to effectively verify the correctness of returned results and to guarantee the code not be spied. In order to improve the success rate of task implementation further and reduce job cycle time, tasks ought to be distributed to those nodes with good reputations and high success rate of task implementation to execute. This paper proposed the credibility evaluation of node,described the work procedure of the code protection mechanism and gave the analysis and verification of the security performance of the system in detail.
Key words: Cloud computing, Information security, Code protection, Credibility evaluation
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2012/V39/I7/7
Cited