Evaluation of Influence Exerted by a Malicious Group's Various Aims in the External Grid

The external grid is one of grid computing systems. It is composed of numerous computers connected to the Internet. Although the external grid realizes high performance computing, it is necessary to guarantee the robustness against malicious behaviors of the computers. In the previous literature, a technique to protect program codes against such behaviors has been proposed; however, only one type of malicious behavior is considered to evaluate the effectiveness of the technique in the literature. In reality, malicious behaviors vary according to the purpose of malicious groups. The goal of the research in this paper is to guarantee the safety of the external grid in a quantitative way. In order to achieve the goal, we evaluate the effectiveness of concealing processes against several types of malicious behaviors.