Abstract
The external grid is one of grid computing systems. It is composed of numerous computers connected to the Internet. Although the external grid realizes high performance computing, it is necessary to guarantee the robustness against malicious behaviors of the computers. In the previous literature, a technique to protect program codes against such behaviors has been proposed; however, only one type of malicious behavior is considered to evaluate the effectiveness of the technique in the literature. In reality, malicious behaviors vary according to the purpose of malicious groups. The goal of the research in this paper is to guarantee the safety of the external grid in a quantitative way. In order to achieve the goal, we evaluate the effectiveness of concealing processes against several types of malicious behaviors.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Nakaya, T., Inamoto, T., Higami, Y., Kobayashi, S.: Study on concealmentability of secure processing based on continuity of program flagments (in Japanese). In: Proceedings of DICOMO (Multimedia, Distributed, Cooperative, and Mobile System) 2015, pp. 287–294 (2015)
Yamaguchi, K., Inamoto, T., Higami, Y., Kobayashi, S.: A method to reduce the risk of malicious analysis with dependence relations in external grid computing (in Japanese). In: Proceedings of the 78th National Convention of IPSJ, 5R–07 (2016)
Hirose, Y., Inamoto, T., Higami, Y., Kobayashi, S.: Evaluation of advance processing in terms of processing time on secure processing (in Japanese). In: Proceedings of 14th Forum on Information Technology, vol. 4, pp. 241–242 (2015)
Padua, D.A., Wolfe, M.J.: Advanced computer optimizations for supercomputers. Commun. ACM 29(12), 1184–1201 (1986)
University of California: SETI@Home. http://setiathome.ssl.berkeley.edu/
Acknowledgment
This work was supported by MEXT KAKENHI Grant Number 26330105.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Yamaguchi, K., Inamoto, T., Endo, K., Higami, Y., Kobayashi, S. (2017). Evaluation of Influence Exerted by a Malicious Group’s Various Aims in the External Grid. In: Kobayashi, Sy., Piegat, A., Pejaś, J., El Fray, I., Kacprzyk, J. (eds) Hard and Soft Computing for Artificial Intelligence, Multimedia and Security. ACS 2016. Advances in Intelligent Systems and Computing, vol 534. Springer, Cham. https://doi.org/10.1007/978-3-319-48429-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-48429-7_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48428-0
Online ISBN: 978-3-319-48429-7
eBook Packages: EngineeringEngineering (R0)