Skip to main content
Log in

Defeating Colluding Nodes in Desktop Grid Computing Platforms

  • Published:
Journal of Grid Computing Aims and scope Submit manuscript

Abstract

Desktop Grid systems reached a preeminent place among the most powerful computing platforms in the planet. Unfortunately, they are extremely vulnerable to mischief, because computing projects exert no administrative or technical control on volunteers. These can very easily output bad results, due to software or hardware glitches (resulting from over-clocking for instance), to get unfair computational credit, or simply to ruin the project. To mitigate this problem, Desktop Grid servers replicate work units and apply majority voting, typically on 2 or 3 results. In this paper, we observe that simple majority voting is powerless against malicious volunteers that collude to attack the project. We argue that to identify this type of attack and to spot colluding nodes, each work unit needs at least 3 voters. In addition, we propose to post-process the voting pools in two steps. i) In the first step, we use a statistical approach to identify nodes that were not colluding, but submitted bad results; ii) then, we use a rather simple principle to go after malicious nodes which acted together: they might have won conflicting voting pools against nodes that were not identified in step i. We use simulation to show that our heuristic can be quite effective against colluding nodes, in scenarios where honest nodes form a majority.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Anderson, D.P.: BOINC: a system for public-resource computing and storage. In: 5th Intl Workshop on Grid Computing (GRID 2004), 2004, USA, Proceedings, pp. 4–10. IEEE Computer Society, Piscataway (2004)

    Google Scholar 

  2. Anderson, D.P., McLeod, J.: Local scheduling for volunteer computing. In: 21th Intl. Parallel and Distributed Processing Symposium (IPDPS 2007), Proceedings, 2007, USA, pp. 1–8. IEEE Computer Society, Piscataway (2007)

    Google Scholar 

  3. Cappello, F., Djilali, S., Fedak, G., Hérault, T., Magniette, F., Néri, V., Lodygensky, O.: Computing on large-scale distributed systems: XtremWeb architecture, programming models, security, tests and convergence with grid. Future Gener. Comput. Syst. 21(3), 417–437 (2005)

    Article  Google Scholar 

  4. Costa, F., Silva, L., Fedak, G., Kelley, I.: Optimizing data distribution in desktop grid platforms. Parallel Process. Lett. 18(3), 391–410 (2008)

    Article  Google Scholar 

  5. Domingues, P., Sousa, B., Silva, L.M.: Sabotage-tolerance and trust management in desktop grid computing. Future Gener. Comput. Syst. 23(7), 904–912 (2007)

    Article  Google Scholar 

  6. Douceur, J.R.: The sybil attack. In: Peer-to-Peer Systems, First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7-8, 2002, Revised Papers. Lecture Notes in Computer Science, vol. 2429, pp. 251–260. Springer, New York (2002)

    Google Scholar 

  7. Fedak, G., He, H., Cappello, F.: Bitdew: a programmable environment for large-scale data management and distribution. In: SC ’08: Proceedings of the 2008 ACM/IEEE Conference on Supercomputing, pp. 1–12. IEEE, Piscataway (2008)

    Google Scholar 

  8. Guha, S., Rastogi, R., Shim, K.: Rock: A robust clustering algorithm for categorical attributes. In: Data Engineering, International Conference on (1999)

  9. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: WWW ’03: Proc. of the 12th Intl. Conf. on WWW, pp. 640–651. ACM, New York (2003)

    Google Scholar 

  10. Karlin, S., Taylor, H.M.: A First Course in Stochastic Processes, 2nd edn. Academic, London (1975)

    MATH  Google Scholar 

  11. Kim, J.S., Nam, B., Marsh, M.A., Keleher, P.J., Bhattacharjee, B., Richardson, D., Wellnitz, D., Sussman, A.: Creating a robust desktop grid using peer-to-peer services. In: 21th Intl. Parallel and Distributed Processing Symp. (IPDPS 2007), Proceedings, 2007, USA. IEEE, Piscataway (2007)

    Google Scholar 

  12. Kondo, D., Araujo, F., Malecot, P., Domingues, P., Silva, L.M., Fedak, G., Cappello, F.: Characterizing result errors in internet desktop grids. In: Euro-Par 2007, Parallel Processing, 13th Intl Euro-Par Conf, France, 2007, Proceedings. LNCS, vol. 4641, pp. 361–371. Springer, New York (2007)

    Google Scholar 

  13. MacQueen, J.B.: Some methods for classification and analysis of multivariate observations. In: Cam, L.M.L., Neyman, J. (eds.) Proc. of the 5th Berkeley Symposium on Mathematical Statistics and Probability, vol. 1, pp. 281–297. University of California Press, Berkeley (1967)

    Google Scholar 

  14. Malkhi, D., Reiter, M.K.: Byzantine quorum systems. Distrib. Comput. 11(4), 203–213 (1998)

    Article  Google Scholar 

  15. Sarmenta, L.F.G.: Sabotage-tolerance mechanisms for volunteer computing systems. Future Gener. Comput. Syst. 18(4), 561–572 (2002)

    Article  MATH  Google Scholar 

  16. Silaghi, G.C., Domingues, P., Araujo, F., Silva, L., Arenas, A.: Defeating colluding nodes in desktop grid computing platforms. In: Parallel and Distributed Processing, 2008. IPDPS 2008. IEEE International Symposium on, pp. 1–8 (2008)

  17. Wei, B., Fedak, G., Cappello, F.: Collaborative data distribution with bittorrent for computational desktop grids. In: 4th Intl Symposium on Parallel and Distributed Computing (ISPDC 2005), 2005, France, pp. 250–257. IEEE Computer Society, Piscataway (2005)

    Google Scholar 

  18. Witten, I.E., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques, 2nd edn. Morgan Kaufmann, San Francisco (2005)

    MATH  Google Scholar 

  19. Wong, S.: An authentication protocol in web-computing. In: 20th Intl. Parallel and Distributed Processing Symp. (IPDPS 2006), Proceedings, 2006, Greece. IEEE, Piscataway (2006)

    Google Scholar 

  20. Yurkewych, M., Levine, B.N., Rosenberg, A.L.: On the cost-ineffectiveness of redundancy in commercial p2p computing. In: 12th ACM Conference on Computer and Communications Security (CCS ’05), Proceedings, pp. 280–288. ACM, New York (2005)

    Chapter  Google Scholar 

  21. Zhao, S., Lo, V.M., GauthierDickey, C.: Result verification and trust-based scheduling in peer-to-peer grids. In: 5th IEEE Intl Conf. on Peer-to-Peer Computing (P2P 2005), 2005, Germany, pp. 31–38. IEEE Computer Society, Piscataway (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gheorghe Cosmin Silaghi.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Silaghi, G.C., Araujo, F., Silva, L.M. et al. Defeating Colluding Nodes in Desktop Grid Computing Platforms. J Grid Computing 7, 555 (2009). https://doi.org/10.1007/s10723-009-9124-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10723-009-9124-5

Keywords

Navigation