Currently there is no effective security solution for the grid computing code migration process. Computing objects must be concealed from conspiring computers misusing personal or otherwise classified information. Many techniques attempt object concealment, but in consideration of their failures it is proposed that by combining dummy code insertion and program division and decentralization methods the effect of concealment increases. By interleaving multiple segments from different programs and inserting dummy code, purpose of processing is concealed. By using at least one unanimously trustworthy computer to handle the interleaving process, conspiring computers lacks necessary information for analysis.
展开▼