Skip to main content

Evaluation of Influence Exerted by a Malicious Group’s Various Aims in the External Grid

  • Conference paper
  • First Online:
Hard and Soft Computing for Artificial Intelligence, Multimedia and Security (ACS 2016)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 534))

Included in the following conference series:

  • 833 Accesses

Abstract

The external grid is one of grid computing systems. It is composed of numerous computers connected to the Internet. Although the external grid realizes high performance computing, it is necessary to guarantee the robustness against malicious behaviors of the computers. In the previous literature, a technique to protect program codes against such behaviors has been proposed; however, only one type of malicious behavior is considered to evaluate the effectiveness of the technique in the literature. In reality, malicious behaviors vary according to the purpose of malicious groups. The goal of the research in this paper is to guarantee the safety of the external grid in a quantitative way. In order to achieve the goal, we evaluate the effectiveness of concealing processes against several types of malicious behaviors.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nakaya, T., Inamoto, T., Higami, Y., Kobayashi, S.: Study on concealmentability of secure processing based on continuity of program flagments (in Japanese). In: Proceedings of DICOMO (Multimedia, Distributed, Cooperative, and Mobile System) 2015, pp. 287–294 (2015)

    Google Scholar 

  2. Yamaguchi, K., Inamoto, T., Higami, Y., Kobayashi, S.: A method to reduce the risk of malicious analysis with dependence relations in external grid computing (in Japanese). In: Proceedings of the 78th National Convention of IPSJ, 5R–07 (2016)

    Google Scholar 

  3. Hirose, Y., Inamoto, T., Higami, Y., Kobayashi, S.: Evaluation of advance processing in terms of processing time on secure processing (in Japanese). In: Proceedings of 14th Forum on Information Technology, vol. 4, pp. 241–242 (2015)

    Google Scholar 

  4. Padua, D.A., Wolfe, M.J.: Advanced computer optimizations for supercomputers. Commun. ACM 29(12), 1184–1201 (1986)

    Article  Google Scholar 

  5. University of California: SETI@Home. http://setiathome.ssl.berkeley.edu/

Download references

Acknowledgment

This work was supported by MEXT KAKENHI Grant Number 26330105.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kosuke Yamaguchi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Yamaguchi, K., Inamoto, T., Endo, K., Higami, Y., Kobayashi, S. (2017). Evaluation of Influence Exerted by a Malicious Group’s Various Aims in the External Grid. In: Kobayashi, Sy., Piegat, A., Pejaś, J., El Fray, I., Kacprzyk, J. (eds) Hard and Soft Computing for Artificial Intelligence, Multimedia and Security. ACS 2016. Advances in Intelligent Systems and Computing, vol 534. Springer, Cham. https://doi.org/10.1007/978-3-319-48429-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48429-7_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48428-0

  • Online ISBN: 978-3-319-48429-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics