Skip to main content
Log in

A Fair, Secure and Trustworthy Peer-to-Peer Based Cycle-Sharing System

  • Published:
Journal of Grid Computing Aims and scope Submit manuscript

Abstract

The increased popularity of Grid systems and cycle sharing across organizations requires scalable systems that provide facilities to locate resources, to be fair in the use of those resources, to allow resource providers to host untrusted applications safely, and to allow resource consumers to monitor the progress and correctness of jobs executing on remote machines. This paper presents such a framework that locates computational resources with a peer-to-peer network, assures fair resource usage with a distributed credit accounting system, provides resource contributors a safe environment, for example Java Virtual Machine (JVM), to host untrusted applications, and provides the resource consumers a monitoring system, GridCop, to track the progress and correctness of remotely executing jobs. We present the details of the credit accounting subsystem and the GridCop remote job monitoring subsystem. GridCop and the distributed credit accounting system together enable incremental payments so that the risk for both resource providers and resource consumers is bounded.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Andrade, N., Brasileiro, F., Cirne, W., Mowbray, M.: Discouraging free-riding in a peer-to-peer Grid. In: Proceedings of the Thirteenth IEEE International Symposium on High-Performance Distributed Computing (HPDC13), June 2004

  2. Berman, A., Bourassa, V., Selberg, E.: TRON: Process-specific file protection for the UNIX operating system. In: Proceedings of the USENIX 1995 Technical Conference, New Orleans, Louisiana, January 1995

  3. Cooper, B.F., Garcia-Molina, H.: Peer-to-peer resource trading in a reliable distributed system. In: Proc. First International Workshop on Peer-to-Peer Systems, 2002

  4. Butt, A.R., Adabala, S., Kapadia, N.H., Figueiredo, R.J., Fortes, J.A.B.: Grid-computing portals and security issues. Journal of Parallel and Distributed Computing: Special issue on Scalable Web Services and Architecture 63(10), (October 2003)

  5. Butt, A.R., Fang, X., Hu, Y.C., Midkiff, S.: Java, peer-to-peer, and accountability: Building blocks for distributed cycle sharing. In: Proceedings of the 3rd USENIX Virtual Machines Research and Technology Syposium (VM’04), May 2004

  6. Castro, M., Druschel, P., Hu, Y.C., Rowstron, A.: Exploiting network proximity in peer-to-peer overlay networks. Technical report, Technical report MSR-TR-2002-82, 2002. http://research.microsoft.com/~antr/PAST/localtion.ps (17 Oct 2003)

  7. Cheng, D., Hood, R.: A portable debugger for parallel and distributed programs. In: Proceedings of the 1994 ACM/IEEE conference on Supercomputing (SC’94), November 1994

  8. Cox, L.P., Noble, B.D.: Samsara: Honor among thieves in peer-to-peer storage. In: Proc. 19th ACM Symposium on Operating Systems Principles, October 2003

  9. Dabek, F., Kaashoek, M.F., Karger, D., Morris, R., Stoica, I.: Wide-area cooperative storage with CFS. In: Proc. SOSP, October 2001

  10. David, A.P.: BOINC: A system for public-resource computing and storage. In: Proc. 5th IEEE/ACM International Workshop on Grid Computing, November 2004

  11. Distributed.net. distributed.net projects (11 April 2003). http://www.distributed.net/projects.php (28 September 2003)

  12. Du, W., Jia, J., Mangal, M., Murugesan, M.: Uncheatable Grid computing. In: Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS’04), March 2004

  13. Entropia, Inc. {Entropia: PC Grid Computing (16 June 2003). http://www.entropia.com/index.asp (28 September 2003)

  14. Foster, I., Kesselmann, C.: Globus: A metacomputing infrastructure toolkit. Int. J. Supercomput. Appl. 11(2), (Jan. 1997)

  15. Foster, I., Roy, A., Sander, V.: A quality of service architecture that combines resource reservation and application adaptation. In: Proc. 8th International Workshop on Quality of Service, June 2000

  16. Fu, Y., Chase, J., Chun, B., Schwab, S., Vahdat, A.: SHARP: An architecture for secure resource peering. In: Proc. 19th ACM Symposium on Operating Systems Principles, October 2003

  17. Genome@home. Genome at home. http://www.stanford.edu/group/pandegroup/genome/index.html (December 16, 2004)

  18. Golle, P., Leyton-Brown, K., Mironov, I.: Incentives for sharing in peer-to-peer networks. In: Proc. Third ACM Conference on Electronic Commerce, 2001

  19. Gong, L.: Inside Java2 Platform Security. Addison-Wesley, 1999

  20. Grimshaw, A.S., Wulf, W.A.: Legion – A View from 50,000 feet. In: Proc. 5th IEEE International Symposium on High Performance Distributed Computing (HPDC’96), 1996

  21. Ioannidis, J., Keromytis, A., Prevelakis, V.: Fileteller: Paying and getting paid for file storage. In: Proc. Sixth Annual Conference on Financial Cryptography, 2002

  22. Kamp, P.-H., Watson, R.N.M.: Jails: Confining the omnipotent root. In: Proceedings of SANE 2000 Conference, May 2000

  23. Kannan, S., Roberts, M., Mayes, P., Brelsford, D., Skovira, J.F.: Workload Management with LoadLeveler. IBM International Technical Support Organization, 2001. http://www.ibm.com/redbooks (Dec. 17, 2004), publication number SG24-6038-00

  24. Kapadia, N.H., Fortes, J.A.B.: PUNCH: An architecture for Web-enabled wide-area network-computing. Cluster Computing: The Journal of Networks, Software Tools and Applications 2(2), (Sep. 1999)

  25. Litzkow, M., Livny, M., Mutka, M.: Condor – a hunter of idle workstations. In: Proc. 8th International Conference on Distributed Computing Systems (ICDCS 1988), June 1988

  26. Moreira, J., Midkiff, S., Gupta, M., Artigas, P., Wu, P., Almasi, G.: The NINJA project: Making Java work for high performance computing. Commun. ACM 44(10), (October 2001)

  27. Moreira, J.E., Midkiff, S.P., Gupta, M.: From flop to megaflops: Java for technical computing. ACM Trans. Program. Lang. Syst. 22(2), (March 2000). IBM Research Report RC 21166

  28. Nile. Scalable Solution for Distributed Processing of Independent Data. http://www.nile.cornell.edu/index.html (September 29, 2003)

  29. Ratnasamy, S., Francis, P., Handley, M., Karp, R., Schenker, S.: A scalable content-addressable network. In: Proc. ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM’01), 2001

  30. Redell, D.D.: Experience with topaz teledebugging. In: Proceedings SIGPLAN/SIGOPS Workshop on Parallel and Distributed Debugging, May 1988

  31. Rowstron, A., Druschel, P.: PAST: A large-scale, persistent peer-to-peer storage utility. In: Proc. 18th ACM Symposium on Operating Systems Principles, October 2001

  32. Rowstron, A., Druschel, P.: Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In: Proc. IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), November 2001

  33. Sarmenta, L.F.: Sabotage tolerance mechanism for volunteer computing systems. In: CCGrid’01, May 2001

  34. Seti@home. Search for extraterrestrial intelligence at home. http://setiathome.ssl.berkeley.edu/index.html (December 16, 2004)

  35. Smith, L.A., Bull, J.M., Obdrzalek, J.: A parallel java grande benchmark suite. In: Proceedings of the 2001 ACM/IEEE Conference on Supercomputing (SC2001), November 2001

  36. Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for internet applications. In: Proc. ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM’01), 2001

  37. Sun(TM) Microsystems. Sun ONE Grid Engine Software (26 June 2003). http://www.sun.com/software/gridware/ sge.html (29 September 2003)

  38. Ngan, T-W.J., Wallach, D.S., Druschel, P.: Enforcing fair sharing of peer-to-peer resources. In: Proc. Second International Workshop on Peer-to-Peer Systems, 2003

  39. Yang, S., Butt, A.R., Hu, Y.C., Midkiff, S.P.: Trust but verify: Monitoring remotely executing programs for progress and correctness. In: Proc. of PPOPP’05, June 2005

  40. Zhao, B.Y., Kubiatowicz, J.D., Joseph, A.D.: Tapestry: An Infrastructure for Fault-Resilient Wide-area Location and Routing. Technical Report UCB-CSD-01-1141, U. C. Berkeley, April 2001

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Y. Charlie Hu.

Additional information

*This work was supported by NSF CAREER award grant ACI-0238379 and NSF grants CCR-0313026 and CCR-0313033.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yang, S., Butt, A.R., Fang, X. et al. A Fair, Secure and Trustworthy Peer-to-Peer Based Cycle-Sharing System. J Grid Computing 4, 265–286 (2006). https://doi.org/10.1007/s10723-006-9039-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10723-006-9039-3

Key words

Navigation