Abstract
Recently, distributed computing systems are popular among network security researchers. Distributed computing systems have the problem of required programs being analyzed by malicious computers and people. That is to say, in the four senses of a program, the purpose of processing can be analyzed. The easiest solution to this problem is constructed of only trustworthy computers. However, not all computers on the Internet can be considered trustworthy. There are presently no effective security solutions for this problem. We are developing systems to conceal the purpose of processing. In this paper, we prove that the proposed method conceals the purpose of processing. The proposed method is adaptability with the mobile code systems and grid of the distributed computing systems. We are planning on a method of interleaving multiple fragments, and making an effective dummy code and segments.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
T.Sander, C.F.Tschudin, “Towards Mobile Cryptography”, Technical Report 97-049, International Computer Science Institute, Berkeley, Nov. 22, 1997
S.Morigaki, K.Kashiwagi, Y.Higami, S.Kobayashi “Method to Hide a Purpose of Processing for Code Migration”, IPSJ, DICOMO2004, pp.357-360, 2004-7
S.Morigaki, K.Kashiwagi, Y.Higami, S.Kobayashi “Hiding a Purpose of Processing for Some Programs in Distributed Computer Environment”, SJCIEE, pp.244, 2004-9
Y.Kinoshita, K.Kashiwagi, Y.Higami, S.Kobayashi “Consideration of concealing the Purpose of Processing for Programs in a Distributed Computing Environment”, SJCIEE 2005-9
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this paper
Cite this paper
Kinoshita, Y., Kashiwagi, K., Higami, Y., Kobayashi, SY. (2007). Development of Concealing the Purpose of Processing for Programs in a Distributed Computing Environment. In: Pejaś, J., Saeed, K. (eds) Advances in Information Processing and Protection. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-73137-7_23
Download citation
DOI: https://doi.org/10.1007/978-0-387-73137-7_23
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-73136-0
Online ISBN: 978-0-387-73137-7
eBook Packages: Computer ScienceComputer Science (R0)