Defeating Colluding Nodes in Desktop Grid Computing Platforms
Desktop Grid systems reached a preeminent place among the most powerful computing platforms in the planet. Unfortunately, they are extremely vulnerable to mischief, because computing projects exert no administrative or technical control on volunteers. These can very easily output bad results, due to...
Gespeichert in:
Veröffentlicht in: | Journal of grid computing 2009-12, Vol.7 (4), p.555-573 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Desktop Grid systems reached a preeminent place among the most powerful computing platforms in the planet. Unfortunately, they are extremely vulnerable to mischief, because computing projects exert no administrative or technical control on volunteers. These can very easily output bad results, due to software or hardware glitches (resulting from over-clocking for instance), to get unfair computational credit, or simply to ruin the project. To mitigate this problem, Desktop Grid servers replicate work units and apply majority voting, typically on 2 or 3 results. In this paper, we observe that simple majority voting is powerless against malicious volunteers that collude to attack the project. We argue that to identify this type of attack and to spot colluding nodes, each work unit needs
at least
3 voters. In addition, we propose to post-process the voting pools in two steps.
i
) In the first step, we use a statistical approach to identify nodes that were not colluding, but submitted bad results;
ii
) then, we use a rather simple principle to go after malicious nodes which acted together: they might have won conflicting voting pools against nodes that were not identified in step
i
. We use simulation to show that our heuristic can be quite effective against colluding nodes, in scenarios where honest nodes form a majority. |
---|---|
ISSN: | 1570-7873 1572-9184 |
DOI: | 10.1007/s10723-009-9124-5 |