Journal of Grid Computing

, Volume 4, Issue 3, pp 265–286 | Cite as

A Fair, Secure and Trustworthy Peer-to-Peer Based Cycle-Sharing System

  • Shuo Yang
  • Ali R. Butt
  • Xing Fang
  • Y. Charlie HuEmail author
  • Samuel P. Midkiff


The increased popularity of Grid systems and cycle sharing across organizations requires scalable systems that provide facilities to locate resources, to be fair in the use of those resources, to allow resource providers to host untrusted applications safely, and to allow resource consumers to monitor the progress and correctness of jobs executing on remote machines. This paper presents such a framework that locates computational resources with a peer-to-peer network, assures fair resource usage with a distributed credit accounting system, provides resource contributors a safe environment, for example Java Virtual Machine (JVM), to host untrusted applications, and provides the resource consumers a monitoring system, GridCop, to track the progress and correctness of remotely executing jobs. We present the details of the credit accounting subsystem and the GridCop remote job monitoring subsystem. GridCop and the distributed credit accounting system together enable incremental payments so that the risk for both resource providers and resource consumers is bounded.

Key words

Peer-to-peer Cycle-sharing Grid Fairness Incentive Monitoring Trustworthiness 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Andrade, N., Brasileiro, F., Cirne, W., Mowbray, M.: Discouraging free-riding in a peer-to-peer Grid. In: Proceedings of the Thirteenth IEEE International Symposium on High-Performance Distributed Computing (HPDC13), June 2004Google Scholar
  2. 2.
    Berman, A., Bourassa, V., Selberg, E.: TRON: Process-specific file protection for the UNIX operating system. In: Proceedings of the USENIX 1995 Technical Conference, New Orleans, Louisiana, January 1995Google Scholar
  3. 3.
    Cooper, B.F., Garcia-Molina, H.: Peer-to-peer resource trading in a reliable distributed system. In: Proc. First International Workshop on Peer-to-Peer Systems, 2002Google Scholar
  4. 4.
    Butt, A.R., Adabala, S., Kapadia, N.H., Figueiredo, R.J., Fortes, J.A.B.: Grid-computing portals and security issues. Journal of Parallel and Distributed Computing: Special issue on Scalable Web Services and Architecture 63(10), (October 2003)Google Scholar
  5. 5.
    Butt, A.R., Fang, X., Hu, Y.C., Midkiff, S.: Java, peer-to-peer, and accountability: Building blocks for distributed cycle sharing. In: Proceedings of the 3rd USENIX Virtual Machines Research and Technology Syposium (VM’04), May 2004Google Scholar
  6. 6.
    Castro, M., Druschel, P., Hu, Y.C., Rowstron, A.: Exploiting network proximity in peer-to-peer overlay networks. Technical report, Technical report MSR-TR-2002-82, 2002. (17 Oct 2003)
  7. 7.
    Cheng, D., Hood, R.: A portable debugger for parallel and distributed programs. In: Proceedings of the 1994 ACM/IEEE conference on Supercomputing (SC’94), November 1994Google Scholar
  8. 8.
    Cox, L.P., Noble, B.D.: Samsara: Honor among thieves in peer-to-peer storage. In: Proc. 19th ACM Symposium on Operating Systems Principles, October 2003Google Scholar
  9. 9.
    Dabek, F., Kaashoek, M.F., Karger, D., Morris, R., Stoica, I.: Wide-area cooperative storage with CFS. In: Proc. SOSP, October 2001Google Scholar
  10. 10.
    David, A.P.: BOINC: A system for public-resource computing and storage. In: Proc. 5th IEEE/ACM International Workshop on Grid Computing, November 2004Google Scholar
  11. 11. projects (11 April 2003). (28 September 2003)
  12. 12.
    Du, W., Jia, J., Mangal, M., Murugesan, M.: Uncheatable Grid computing. In: Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS’04), March 2004Google Scholar
  13. 13.
    Entropia, Inc. {Entropia: PC Grid Computing (16 June 2003). (28 September 2003)
  14. 14.
    Foster, I., Kesselmann, C.: Globus: A metacomputing infrastructure toolkit. Int. J. Supercomput. Appl. 11(2), (Jan. 1997)Google Scholar
  15. 15.
    Foster, I., Roy, A., Sander, V.: A quality of service architecture that combines resource reservation and application adaptation. In: Proc. 8th International Workshop on Quality of Service, June 2000Google Scholar
  16. 16.
    Fu, Y., Chase, J., Chun, B., Schwab, S., Vahdat, A.: SHARP: An architecture for secure resource peering. In: Proc. 19th ACM Symposium on Operating Systems Principles, October 2003Google Scholar
  17. 17.
    Genome@home. Genome at home. (December 16, 2004)
  18. 18.
    Golle, P., Leyton-Brown, K., Mironov, I.: Incentives for sharing in peer-to-peer networks. In: Proc. Third ACM Conference on Electronic Commerce, 2001Google Scholar
  19. 19.
    Gong, L.: Inside Java2 Platform Security. Addison-Wesley, 1999Google Scholar
  20. 20.
    Grimshaw, A.S., Wulf, W.A.: Legion – A View from 50,000 feet. In: Proc. 5th IEEE International Symposium on High Performance Distributed Computing (HPDC’96), 1996Google Scholar
  21. 21.
    Ioannidis, J., Keromytis, A., Prevelakis, V.: Fileteller: Paying and getting paid for file storage. In: Proc. Sixth Annual Conference on Financial Cryptography, 2002Google Scholar
  22. 22.
    Kamp, P.-H., Watson, R.N.M.: Jails: Confining the omnipotent root. In: Proceedings of SANE 2000 Conference, May 2000Google Scholar
  23. 23.
    Kannan, S., Roberts, M., Mayes, P., Brelsford, D., Skovira, J.F.: Workload Management with LoadLeveler. IBM International Technical Support Organization, 2001. (Dec. 17, 2004), publication number SG24-6038-00
  24. 24.
    Kapadia, N.H., Fortes, J.A.B.: PUNCH: An architecture for Web-enabled wide-area network-computing. Cluster Computing: The Journal of Networks, Software Tools and Applications 2(2), (Sep. 1999)Google Scholar
  25. 25.
    Litzkow, M., Livny, M., Mutka, M.: Condor – a hunter of idle workstations. In: Proc. 8th International Conference on Distributed Computing Systems (ICDCS 1988), June 1988Google Scholar
  26. 26.
    Moreira, J., Midkiff, S., Gupta, M., Artigas, P., Wu, P., Almasi, G.: The NINJA project: Making Java work for high performance computing. Commun. ACM 44(10), (October 2001)Google Scholar
  27. 27.
    Moreira, J.E., Midkiff, S.P., Gupta, M.: From flop to megaflops: Java for technical computing. ACM Trans. Program. Lang. Syst. 22(2), (March 2000). IBM Research Report RC 21166Google Scholar
  28. 28.
    Nile. Scalable Solution for Distributed Processing of Independent Data. (September 29, 2003)
  29. 29.
    Ratnasamy, S., Francis, P., Handley, M., Karp, R., Schenker, S.: A scalable content-addressable network. In: Proc. ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM’01), 2001Google Scholar
  30. 30.
    Redell, D.D.: Experience with topaz teledebugging. In: Proceedings SIGPLAN/SIGOPS Workshop on Parallel and Distributed Debugging, May 1988Google Scholar
  31. 31.
    Rowstron, A., Druschel, P.: PAST: A large-scale, persistent peer-to-peer storage utility. In: Proc. 18th ACM Symposium on Operating Systems Principles, October 2001Google Scholar
  32. 32.
    Rowstron, A., Druschel, P.: Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In: Proc. IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), November 2001Google Scholar
  33. 33.
    Sarmenta, L.F.: Sabotage tolerance mechanism for volunteer computing systems. In: CCGrid’01, May 2001Google Scholar
  34. 34.
    Seti@home. Search for extraterrestrial intelligence at home. (December 16, 2004)
  35. 35.
    Smith, L.A., Bull, J.M., Obdrzalek, J.: A parallel java grande benchmark suite. In: Proceedings of the 2001 ACM/IEEE Conference on Supercomputing (SC2001), November 2001Google Scholar
  36. 36.
    Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for internet applications. In: Proc. ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM’01), 2001Google Scholar
  37. 37.
    Sun(TM) Microsystems. Sun ONE Grid Engine Software (26 June 2003). sge.html (29 September 2003)
  38. 38.
    Ngan, T-W.J., Wallach, D.S., Druschel, P.: Enforcing fair sharing of peer-to-peer resources. In: Proc. Second International Workshop on Peer-to-Peer Systems, 2003Google Scholar
  39. 39.
    Yang, S., Butt, A.R., Hu, Y.C., Midkiff, S.P.: Trust but verify: Monitoring remotely executing programs for progress and correctness. In: Proc. of PPOPP’05, June 2005Google Scholar
  40. 40.
    Zhao, B.Y., Kubiatowicz, J.D., Joseph, A.D.: Tapestry: An Infrastructure for Fault-Resilient Wide-area Location and Routing. Technical Report UCB-CSD-01-1141, U. C. Berkeley, April 2001Google Scholar

Copyright information

© Springer Science+Business Media B.V. 2006

Authors and Affiliations

  • Shuo Yang
    • 1
  • Ali R. Butt
    • 1
  • Xing Fang
    • 1
  • Y. Charlie Hu
    • 1
    Email author
  • Samuel P. Midkiff
    • 1
  1. 1.School of Electrical and Computer EngineeringPurdue UniversityWest LafayetteUSA

Personalised recommendations