Protecting Agent from Attack in Grid ComputingIII

  • Authors:
  • Byungryong Kim

  • Affiliations:
  • DongBang Data Technology Co., Ltd. No.417, Hanshin IT Tower #235, Kuro-Dong, Kuro-Ku, Seoul, 152-050, Korea

  • Venue:
  • SOFSEM '07 Proceedings of the 33rd conference on Current Trends in Theory and Practice of Computer Science
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

P2P network has been emerging as a very attractive content distribution mechanism. Nevertheless flooding based applications and systems with distribution hash tables based model, which are already developed, are having difficulty in the development and the application because they do not satisfy many issues such as privacy protection of end-user. In this study we propose neighbor-set based privacy protection model. The proposed technique is based on the typical distributed hash tables model, chord, and was designed to be protected from attack by securing anonymity to participating nodes. Proposed protecting scheme and how to solve the problem of load balancing caused in the process will be explained.