Title
Deceptive Detection and Security Reinforcement in Grid Computing
Abstract
Grid computing is an interesting kind of distributed computing. It has been applied to biological science, medical science, Military science, and many other fields. The participant cheating problem has been a hot topic in grid computing. However, in the existing deceptive detection schemes, the computing power of the supervisor has not been classified and discussed based on the characteristics of the computational task. Hence, these deception schemes are not very suitable for the practical applications. According to the task publisher's computing power, we will classify the deceptive detection schemes into two categories, and then analyze the security of deceptive detection schemes based on the characteristics of computational task function. On the basis of double check, we proposed an improved scheme at the cost of time sacrifice called the secondary allocation scheme of double check. In our scheme, the security of double check has been greatly strengthened. Finally, we analyzed the common problem of High-value rare Events, improved the deceptive detection scheme due to Du et al. [1], and then put forward a new deceptive detection scheme with better security and efficiency.
Year
DOI
Venue
2013
10.1109/INCoS.2013.30
INCoS
Keywords
Field
DocType
secondary allocation scheme,double check,double check security,grid computing,medical science,existing deceptive detection scheme,biological science,ringer,pattern classification,cheating,security reinforcement,double check secondary allocation scheme,deception scheme,deceptive detection,deceptive detection scheme,computational task function,deceptive detection scheme security,computing power,distributed computing,better security,high-value rare events problem,improved scheme,security,deceptive detection scheme classification,new deceptive detection scheme,security of data,military science
Supervisor,Double check,Grid computing,Deception,Computer science,Military science,Cheating,Rare events,Computer security model,Distributed computing
Conference
Citations 
PageRank 
References 
0
0.34
4
Authors
3
Name
Order
Citations
PageRank
Jianhua Yu150.78
Yue Luo202.37
Xueli Wang313114.31