Font Size: a A A

Security Research On Migrating Workflow Instance Based On Temopral Assertions

Posted on:2009-10-28Degree:MasterType:Thesis
Country:ChinaCandidate:F C SunFull Text:PDF
GTID:2178360245496326Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The migrating workflow is a new direction within the workflow management area. In migrating workflow system that based on the mobile computing paradigm,the three elements are migrating workflow management engine,migrating instance and workstation.Management engine is in charge of the definition of workflow procedure, the generation of migrating instance and the coordination of migrating instances; Workstation which refers to the anchorage server and working-machine network is the workspace of migrating instance;migrating instance is defined as the executor of tasks,it is generated by management engine and can migrate within workstations, using the local resources and services provided by workstation executing one or many tasks.When MI finds current workstation can't satisfies the requirement of executing task,MI can migrate to another workstation that can satisfies it's requirement and continue executing.Compared with the RPC,migrating instance has stronger autonomy.It solves the problem of network communication's bottleneck well,add the degree of multitasking parallel proceeding,enhance the system's flexibility,expandability and fault tolerance.The technology of MI has became the most active direction of computer's network and distributed system,but the security of Migrating Instance has to meet special demands under the complicated environment of network.In this paper,we introduce the potential safety hazards that MI face first,then after we analysis the protection technology of MI,we put forward an runtime verification scheme that bases on LTL,Java Annotation,this scheme can check the security state of running's MI real-time.This scheme analysis any potential security hazards in the MI's migration process first,for example eavesdropping,Tamper or forgery and so on,According to various security threats and characteristics design different security Assertions,then according to the MI's running state figure analysis the constraints that MI have to follows when it running,using operational constraint Assertions represent the constraints that MI has to follows when it running.After defining these temporal assertions that have to verify,we use @LTL annotate(these annotations express the temporal assertions that this applications will verify)source code,and use J-LO to verify these properties. The result of experiment shows that this scheme can check the security state of running's MI effect,can improve the security of migrating workflow management system.But when real-time check the security state of MI,it may inevitable or unavoidable bring down the sytem's performance,so how to balance the security,performance and cost is the indispensable foundation for the development of migrating workflow management system.Migrating workflow is a new technology,migrating instance has special advantage in Large-scale,distributed,cross-platform applications.However,due to the current technology has not yet matured,it's management,communication mechanism,migration,security,and many other areas need further study.Along with the continuous deepening of research,migration work flow system's security issues will be gradually resolved.
Keywords/Search Tags:Migrating Workflow, Migrating Instance, Temporal Assertions, Runtime Verification
PDF Full Text Request
Related items