A Scheduling and Certification Algorithm for Defeating Collusion in Desktop Grids

被引:7
作者
Canon, Louis-Claude [1 ]
Jeannot, Emmanuel [2 ]
Weissman, Jon [3 ]
机构
[1] Grenoble Univ, Grenoble INP, INRIA, Grenoble, France
[2] LaBRI, INRIA, Bordeaux, France
[3] Univ Minnesota, Dept Comp Sci & Engn, Minneapolis, MN 55455 USA
来源
31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011) | 2011年
关键词
Desktop Grid; Collusion; Modeling; Sabotage; SABOTAGE-TOLERANCE;
D O I
10.1109/ICDCS.2011.66
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
By exploiting idle time on volunteer machines, desktop grids provide a way to execute large sets of tasks with negligible maintenance and low cost. Although desktop grids are attractive for their scalability and low cost, relying on external resources may compromise the correctness of application execution due to the well-known unreliability of nodes. In this paper, we consider a very challenging threat model: correlated errors caused either by organized groups of cheaters that may collude to produce incorrect results, or by buggy or so-called "unofficial" clients. By using a previously described on-line algorithm for detecting collusion and characterizing the participant behaviors, we propose a scheduling and result certification algorithm that tackles collusion. Using several real-life traces, we show that our approach minimizes both replication overhead and the number of incorrectly certified results.
引用
收藏
页码:343 / 352
页数:10
相关论文
共 19 条
  • [1] BOINC: A system for public-resource computing and storage
    Anderson, DP
    [J]. FIFTH IEEE/ACM INTERNATIONAL WORKSHOP ON GRID COMPUTING, PROCEEDINGS, 2004, : 4 - 10
  • [2] SETI@home - An experiment in public-resource computing
    Anderson, DP
    Cobb, J
    Korpela, E
    Lebofsky, M
    Werthimer, D
    [J]. COMMUNICATIONS OF THE ACM, 2002, 45 (11) : 56 - 61
  • [3] [Anonymous], NDSS
  • [4] [Anonymous], 2009, IPDPS
  • [5] [Anonymous], 2010, CCGrid, DOI DOI 10.1109/CCGRID.2010.71
  • [6] Canon L.-C., 2010, 24 IEEE INT PAR DIST
  • [7] Canon L.-C., 2010, RR7403 INRIA
  • [8] Sabotage-tolerance and trust management in desktop grid computing
    Domingues, Patricio
    Sousa, Bruno
    Silva, Luis Moura
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2007, 23 (07): : 904 - 912
  • [9] The Sybil attack
    Douceur, JR
    [J]. PEER-TO-PEER SYSTEMS, 2002, 2429 : 251 - 260
  • [10] Fernandez A., 2006, P 25 IEEE S SYST REL