Font Size: a A A

Research On Privacy Preservation In Grid Environment

Posted on:2011-06-11Degree:MasterType:Thesis
Country:ChinaCandidate:S L JingFull Text:PDF
GTID:2178330338976281Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of grid technology, people pay more and more attention to the security of grid system. The collaborative grid nodes during grid computing, may be partners of mutual trust, also may be not be fully trusted partner, and even competitors with each other. There exists many problems about the disclosure of private information in the existing models either, such as grid users'identities, the sensitive information involved in the task, the private information of grid terminal.The disclosure of these private information will bring about very serious consequences to the participants in grid computing, It also restricts the widely use of grid technology. Therefore, the research of private preserving in grid environment becomes an important aspect in the field of grid security.The main contribution of this paper is as follows:Firstly, this paper describes the security issues and security requirements in grid environments, and analyzes the requirements of private preserving in grid environment. And then we discuss the key technologies of private preserving.Secondly, This paper analyzes the reasons where exists the disclosure of private information in grid environment, and conducts a study aiming at the disclosure of private information involved in the users'submitting task, and proposes a private preserving model in grid environment, and also proposes a task-based privacy preservation algorithm adapting to this model. Besides, this paper classifies the resource terminals into trust terminals and non-trusted terminals.Thus, we propose a private preserving algorithm based on operation separation of sensitive properties, and further considers the load balancing of grid service center, we propose a private preserving algorithm based on Super-nodes.Finally, we use a grid simulation tools GridSim, combining the JCreator IDE, improve the GridSim, and also do some simulation experiments. The result of the experiments shows that our model and algorithms are feasible in grid environment. In order to reduce the task processing time, we can build different grid topologies in accordance with the different grid environment.
Keywords/Search Tags:grid security, privacy preservation, sensitive property, binary tree, semantic conversion, XML
PDF Full Text Request
Related items