Abstract
This paper presents a new approach for certifying the correctness of program executions in hostile environments, where tasks or their results have been corrupted due to benign or malicious act. Extending previous results in the restricted context of independent tasks, we introduce a probabilistic certification that establishes whether the results of computations are correct. This probabilistic approach does not make any assumptions about the attack and certification errors are only due to unlucky random choices. Bounds associated with certification are provided for general graphs and for tasks with out-tree dependencies found in a medical image analysis application that motivated the research.
This work has been supported by CNRS ACI Grid-DOCG and the Region Rhône-Alpes (Ragtime project).
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
CERT/CC Statistics 1988-2004, CERT Coordination Center, http://www.cert.org/stats/cert_stats.html
Foster, I., Kesselman, C., Nick, J., Tuecke, S.: Grid Services for Distributed System Integration. IEEE Computer 35(6), 37–46 (2002)
Hideo, F.: Logic Testing and Design for Testability. MIT Press, Cambridge (1985)
Gao, L., Malewicz, G.: Internet Computing of Tasks with Dependencies using Unreliable Workers. In: Higashino, T. (ed.) OPODIS 2004. LNCS, vol. 3544, pp. 443–458. Springer, Heidelberg (2005) (to appear)
Germain, C., Playez, N.: Result Checking in Global Computing Systems. In: Proceedings of the 17th Annual ACM International Conference on Supercomputing (ICS 2003), San Francisco, California, June 23-26, pp. 218–227 (2003)
Jafar, S., Varrette, S., Roch, J.-L.: Using Data-Flow Analysis for Resilence and Result Checking in Peer to Peer Computations. In: Galindo, F., Takizawa, M., Traunmüller, R. (eds.) DEXA 2004. LNCS, vol. 3180, pp. 512–516. Springer, Heidelberg (2004)
Montagnat, J., Breton, V., Magnin, I.: Partitioning medical image databases for content-based queries on grid. Methods of Information in Medicine, Special Issue HealthGrid 2004 (2004) (to appear)
Ragtime: Grille pour le Traitement d’Informations Médicales, Région Rhône-Alpes, http://liris.univ-lyon2.fr/~miguet/ragtime/
Sarmenta, L.F.G.: Sabotage-Tolerance Mechanisms for Volunteer Computing Systems. Future Generation Computer Systems 18(4), 561–572 (2002)
Wasserman, H., Blum, M.: Software reliability via run-time result-checking. Journal of the ACM 44(6), 826–849 (1997)
Von Welch, et al.: Security for Grid Services. In: 12th Intl. Symposium on High Performance Distributed Computing (HPDC-12), Seattle, WA, June 22-24, pp. 48–57 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Krings, A., Roch, JL., Jafar, S., Varrette, S. (2005). A Probabilistic Approach for Task and Result Certification of Large-Scale Distributed Applications in Hostile Environments. In: Sloot, P.M.A., Hoekstra, A.G., Priol, T., Reinefeld, A., Bubak, M. (eds) Advances in Grid Computing - EGC 2005. EGC 2005. Lecture Notes in Computer Science, vol 3470. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11508380_34
Download citation
DOI: https://doi.org/10.1007/11508380_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26918-2
Online ISBN: 978-3-540-32036-4
eBook Packages: Computer ScienceComputer Science (R0)