Luis Carlos Coronado García, Jesús Alejandro González-Fuentes, Pedro Josué Hernández-Torres, C. P. Leguízamo
{"title":"使用基于软件的安全数据域的自治分散系统架构","authors":"Luis Carlos Coronado García, Jesús Alejandro González-Fuentes, Pedro Josué Hernández-Torres, C. P. Leguízamo","doi":"10.1109/ISADS.2011.50","DOIUrl":null,"url":null,"abstract":"Autonomous Decentralized System (ADS) has been proposed for providing on-line expansion and maintenance and also fault-tolerance. The associated architecture is composed by a Data Field (DF - on this element, the information is flowing among all the elements connected to it) and Autonomous Control Processors (ACP - part of an entity where the information coming from the DF is preprocessed and manages data consistency and fault tolerance) with their Application Software Module (ASM - part of an entity which processes the information belonging to its own tasks). We are developing an ADS Infrastructure that will permit us to integrate heterogeneous systems with the characteristics provided by this paradigm. We develop a Software-Based DF composed of Nodes. Each Node is a software application with a simple communication protocol and a basic management user interface. The nodes, all together, are responsible for forming a network communicating one with each others. The main task for each node is to identify any entity and redirect messages for delivery. In our infrastructure, the DF is the core of the architecture and since it is a software implementation there may exist several security risks such as intruders or apocryphal components which can pretend to belong to the system. In this paper we show the technology proposed for providing a secure DF which allows to identify and authenticate each component that pretends to connect to the DF.","PeriodicalId":221833,"journal":{"name":"2011 Tenth International Symposium on Autonomous Decentralized Systems","volume":"53 3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"An Autonomous Decentralized System Architecture Using a Software-Based Secure Data Field\",\"authors\":\"Luis Carlos Coronado García, Jesús Alejandro González-Fuentes, Pedro Josué Hernández-Torres, C. P. Leguízamo\",\"doi\":\"10.1109/ISADS.2011.50\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Autonomous Decentralized System (ADS) has been proposed for providing on-line expansion and maintenance and also fault-tolerance. The associated architecture is composed by a Data Field (DF - on this element, the information is flowing among all the elements connected to it) and Autonomous Control Processors (ACP - part of an entity where the information coming from the DF is preprocessed and manages data consistency and fault tolerance) with their Application Software Module (ASM - part of an entity which processes the information belonging to its own tasks). We are developing an ADS Infrastructure that will permit us to integrate heterogeneous systems with the characteristics provided by this paradigm. We develop a Software-Based DF composed of Nodes. Each Node is a software application with a simple communication protocol and a basic management user interface. The nodes, all together, are responsible for forming a network communicating one with each others. The main task for each node is to identify any entity and redirect messages for delivery. In our infrastructure, the DF is the core of the architecture and since it is a software implementation there may exist several security risks such as intruders or apocryphal components which can pretend to belong to the system. In this paper we show the technology proposed for providing a secure DF which allows to identify and authenticate each component that pretends to connect to the DF.\",\"PeriodicalId\":221833,\"journal\":{\"name\":\"2011 Tenth International Symposium on Autonomous Decentralized Systems\",\"volume\":\"53 3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-03-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 Tenth International Symposium on Autonomous Decentralized Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISADS.2011.50\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 Tenth International Symposium on Autonomous Decentralized Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISADS.2011.50","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Autonomous Decentralized System Architecture Using a Software-Based Secure Data Field
Autonomous Decentralized System (ADS) has been proposed for providing on-line expansion and maintenance and also fault-tolerance. The associated architecture is composed by a Data Field (DF - on this element, the information is flowing among all the elements connected to it) and Autonomous Control Processors (ACP - part of an entity where the information coming from the DF is preprocessed and manages data consistency and fault tolerance) with their Application Software Module (ASM - part of an entity which processes the information belonging to its own tasks). We are developing an ADS Infrastructure that will permit us to integrate heterogeneous systems with the characteristics provided by this paradigm. We develop a Software-Based DF composed of Nodes. Each Node is a software application with a simple communication protocol and a basic management user interface. The nodes, all together, are responsible for forming a network communicating one with each others. The main task for each node is to identify any entity and redirect messages for delivery. In our infrastructure, the DF is the core of the architecture and since it is a software implementation there may exist several security risks such as intruders or apocryphal components which can pretend to belong to the system. In this paper we show the technology proposed for providing a secure DF which allows to identify and authenticate each component that pretends to connect to the DF.