Abstract | ||
---|---|---|
Grid computing is an interesting kind of distributed computing. It has been applied to biological science, medical science, Military science, and many other fields. The participant cheating problem has been a hot topic in grid computing. However, in the existing deceptive detection schemes, the computing power of the supervisor has not been classified and discussed based on the characteristics of the computational task. Hence, these deception schemes are not very suitable for the practical applications. According to the task publisher's computing power, we will classify the deceptive detection schemes into two categories, and then analyze the security of deceptive detection schemes based on the characteristics of computational task function. On the basis of double check, we proposed an improved scheme at the cost of time sacrifice called the secondary allocation scheme of double check. In our scheme, the security of double check has been greatly strengthened. Finally, we analyzed the common problem of High-value rare Events, improved the deceptive detection scheme due to Du et al. [1], and then put forward a new deceptive detection scheme with better security and efficiency. |
Year | DOI | Venue |
---|---|---|
2013 | 10.1109/INCoS.2013.30 | INCoS |
Keywords | Field | DocType |
secondary allocation scheme,double check,double check security,grid computing,medical science,existing deceptive detection scheme,biological science,ringer,pattern classification,cheating,security reinforcement,double check secondary allocation scheme,deception scheme,deceptive detection,deceptive detection scheme,computational task function,deceptive detection scheme security,computing power,distributed computing,better security,high-value rare events problem,improved scheme,security,deceptive detection scheme classification,new deceptive detection scheme,security of data,military science | Supervisor,Double check,Grid computing,Deception,Computer science,Military science,Cheating,Rare events,Computer security model,Distributed computing | Conference |
Citations | PageRank | References |
0 | 0.34 | 4 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jianhua Yu | 1 | 5 | 0.78 |
Yue Luo | 2 | 0 | 2.37 |
Xueli Wang | 3 | 131 | 14.31 |