Font Size: a A A

The Research Of Migrating Instance's Security Migrating Plan In Migrating Workflow System

Posted on:2012-09-12Degree:MasterType:Thesis
Country:ChinaCandidate:H LiFull Text:PDF
GTID:2218330338961955Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In recent years, the migrating workflow has become a new study direction of the workflow management. The migrating workflow based on mobile computing paradigm consists of three elements:workflow management engine, workstation and migrating instance. The workflow management engine defines workflow process, generates migrating instance and coordinates migrating instances'tasks. The workstation provides services for migrating instances and manages workflow network. It is the place of migrating instance to run. The migrating instance executes the workflow's tasks, which can migrate within various workstations and use local resources to finish one or more tasks. In the migrating workflow system, migrating instance is built based on mobile agent paradigm. According to the complexity of the business, the tasks of workflow will be assigned to one or more migrating instances to execute. And migrating instance will plan a route for migrating within workstations to complete the tasks.Migrating instance, as the implementation of workflow tasks, must select a suitable workstation for migrating and performing the task with the user-specified target:fast, effective and safe. Therefore, a suitable migrating path or target is an important issue in migrating workflow system.According to the concept of migrating workflow model and system framework, this paper presents an algorithm of migrating instance's plan of security migration, which is based on immune algorithm and puts security factors as one important parameter for migrating plan.The algorithm adds the module of immune plan in the migrating workflow system, and encodes migrating instance's needs and security requirements as antigen and work location of service information and security as antibody, and simulates the matching process of the immune system in order to get the migration routes dynamically. Then this paper gives the calculation method of affinity for antigen and antibody, the evolution of antibodies and the specific steps of immune algorithm.As the beginning, this paper outlines the knowledge of immune algorithm, security migrating plan and security of mobile agent. And then, it introduces the workflow, mobile agent and migrating workflow. Next, the immune algorithm of security migrating is proposed, and the encoding of antigen and antibody are designed. Finally, a simulated experiment will be given which show that the algorithm effectively avoids the malicious host, significantly reduces the probability of migrating instance attacked and enhance the security of migrating instance.
Keywords/Search Tags:Migrating Workflow, Migrating Instance, Migrating Plan, Security, Immune Algorithm
PDF Full Text Request
Related items