An Efficient and Secure Cloud-Based Distributed Simulation System
نویسندگان
چکیده
For the deficiency of High Level Architecture (HLA), it is not well suited for large-scale distributed simulation systems. To enhance the capability of HLA and satisfy the new requirements of large-scale distributed simulations, an efficient and secure cloudbased distributed simulation system, namely CDS, based on the cloud computing technology and HLA is proposed. CDS provides a service-oriented simulation support environment. It can provide users with on-demand simulation resources, run simulations on the wide area network efficiently, realize share and reuse of simulation resources, improve load balancing capability of the simulation, and provide security guarantee. Compared with previous simulation grid systems, CDS is efficient, secure, universal and practical. From the view of technical implementation, key technologies of CDS are described in details. These technologies include: (1) an agent-based invoking and callback strategy in simulation run-time infrastructure, (2) resource management and scheduling schemes in management center, (3) an efficient security scheme. Through developing CDS and a practical simulation application on it, the performance of CDS is evaluated and the results demonstrate the proposed system functionalities.
منابع مشابه
An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملCloud manufacturing system
Cloud manufacturing is defined as a relationship between the consumer and a flexible array of production services, managed by an intervening architecture that can match service providers to product and manufacturing processes Cloud manufacturing definitions typically make explicit or imply three groups of actors: consumers, who request and use cloud manufacturing processes; application provider...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012