RU2016111524A - A method for verifying the safe distribution of user tasks among nodes of a grid system - Google Patents

A method for verifying the safe distribution of user tasks among nodes of a grid system Download PDF

Info

Publication number
RU2016111524A
RU2016111524A RU2016111524A RU2016111524A RU2016111524A RU 2016111524 A RU2016111524 A RU 2016111524A RU 2016111524 A RU2016111524 A RU 2016111524A RU 2016111524 A RU2016111524 A RU 2016111524A RU 2016111524 A RU2016111524 A RU 2016111524A
Authority
RU
Russia
Prior art keywords
nodes
grid system
verifying
user
legitimate
Prior art date
Application number
RU2016111524A
Other languages
Russian (ru)
Other versions
RU2634184C2 (en
Inventor
Артем Станиславович Коноплев
Максим Олегович Калинин
Original Assignee
федеральное государственное автономное образовательное учреждение высшего образования "Санкт-Петербургский политехнический университет Петра Великого" (ФГАОУ ВО "СПбПУ")
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by федеральное государственное автономное образовательное учреждение высшего образования "Санкт-Петербургский политехнический университет Петра Великого" (ФГАОУ ВО "СПбПУ") filed Critical федеральное государственное автономное образовательное учреждение высшего образования "Санкт-Петербургский политехнический университет Петра Великого" (ФГАОУ ВО "СПбПУ")
Priority to RU2016111524A priority Critical patent/RU2634184C2/en
Publication of RU2016111524A publication Critical patent/RU2016111524A/en
Application granted granted Critical
Publication of RU2634184C2 publication Critical patent/RU2634184C2/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5072Grid computing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Claims (1)

Способ верификации распределения пользовательских задач по узлам грид-системы, включающий принятие решения о легитимности узлов на основании сопоставления прав доступа, запрашиваемых учетной записью пользователя грид-системы с уже предоставленными правами доступа на этих узлах, и распределение пользовательской задачи по легитимным узлам, отличающийся тем, что вначале создают пару криптографических ключей шифрования: открытый и закрытый ключи шифрования, затем принимают решение о легитимности узлов грид-системы и выполняют обмен ключами шифрования, после этого шифруют данные, содержащиеся в пользовательской задаче, открытым ключом шифрования, и распределяют пользовательскую задачу по легитимным узлам грид-системы, затем легитимные узлы грид-системы расшифровывают полученные данные и выполняют пользовательскую задачу.A method for verifying the distribution of user tasks on nodes of a grid system, including deciding on the legitimacy of nodes based on a comparison of the access rights requested by the user account of the grid system with the already granted access rights on these nodes, and the distribution of the user task on legitimate nodes, characterized in that at first they create a pair of cryptographic encryption keys: public and private encryption keys, then decide on the legitimacy of the nodes of the grid system and exchange keys Chami encryption, then encrypts the data contained in the user task, the public encryption key and distribute the user task of legitimate nodes grid system, then legitimate grid system nodes decode received data and perform a user task.
RU2016111524A 2016-03-28 2016-03-28 Verification method of the user tasks safe distribution according to the grid system units RU2634184C2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
RU2016111524A RU2634184C2 (en) 2016-03-28 2016-03-28 Verification method of the user tasks safe distribution according to the grid system units

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
RU2016111524A RU2634184C2 (en) 2016-03-28 2016-03-28 Verification method of the user tasks safe distribution according to the grid system units

Publications (2)

Publication Number Publication Date
RU2016111524A true RU2016111524A (en) 2017-09-29
RU2634184C2 RU2634184C2 (en) 2017-10-24

Family

ID=60047547

Family Applications (1)

Application Number Title Priority Date Filing Date
RU2016111524A RU2634184C2 (en) 2016-03-28 2016-03-28 Verification method of the user tasks safe distribution according to the grid system units

Country Status (1)

Country Link
RU (1) RU2634184C2 (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7644153B2 (en) * 2003-07-31 2010-01-05 Hewlett-Packard Development Company, L.P. Resource allocation management in interactive grid computing systems
US7765552B2 (en) * 2004-09-17 2010-07-27 Hewlett-Packard Development Company, L.P. System and method for allocating computing resources for a grid virtual system
US8261277B2 (en) * 2006-04-10 2012-09-04 General Electric Company System and method for dynamic allocation of resources in a computing grid
RU2494453C2 (en) * 2011-11-24 2013-09-27 Закрытое акционерное общество "Лаборатория Касперского" Method for distributed performance of computer security tasks
RU2536678C1 (en) * 2013-07-30 2014-12-27 ООО "НеоБИТ" Method of authentication of user accounts in grid systems and system for its implementation

Also Published As

Publication number Publication date
RU2634184C2 (en) 2017-10-24

Similar Documents

Publication Publication Date Title
GB2496354B (en) A method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors
BR112017003018A2 (en) secure provision of an authentication credential
BR112017002747A2 (en) computer implemented method, and, computer system.
BR112019008371A2 (en) method, apparatus and data transmission system
CN104378386A (en) Method for cloud data confidentiality protection and access control
DK3381172T3 (en) METHOD AND SYSTEM FOR DISTRIBUTING CRYPTOGRAPHIC KEY CREATION AND STORAGE BY ELLIPTIC CURVE Cryptography
JP2016514912A5 (en)
NZ770092A (en) Methods and systems for virtual file storage and encryption
WO2016122747A3 (en) Storage for encrypted data with enhanced security
RU2018137847A (en) SYSTEM AND METHOD FOR DISTRIBUTION OF KEY MATERIAL AND CERTIFICATE BASED ON IDENTIFICATION INFORMATION
JP2013509089A5 (en)
CN106027503A (en) Cloud storage data encryption method based on TPM
MY190785A (en) Network system for secure communication
JP2016527608A5 (en)
SG10201804297QA (en) Systems and methods for software based encryption
RU2019117050A (en) ENCRYPTED DATA CONTROL THROUGH MULTIPLE CONTROLS
CN106411515B (en) The method and system for promoting key safety are split to key using cipher machine
JP2015534343A5 (en)
IN2014MU00771A (en)
CN102509034A (en) Software license control device and method
FI20120110A (en) Secure remote access license procedure
MX2018007332A (en) Method, device, server and system for authenticating a user.
MY151312A (en) A method and system for file encryption and decryption in a server
WO2015163967A3 (en) Cryptographic method and system of protecting digital content and recovery of same through unique user identification
RU2016111524A (en) A method for verifying the safe distribution of user tasks among nodes of a grid system