Skip to main content

Reliably Executing Tasks in the Presence of Malicious Processors

  • Conference paper
Distributed Computing (DISC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3724))

Included in the following conference series:

  • 650 Accesses

Abstract

The demand for processing large amounts of data has increased over the last decade. As traditional one-processor machines have limited computational power, distributed systems consisting of multitude of cooperating processing units are used instead. An example of such a massive distributed cooperative computation is the SETI@Home project [5]. As the search for extraterrestrial intelligence involves the analysis of gigabytes of raw data that a fixed-size collection of machines would not be able to effectively carry out, the data are distributed to millions of voluntary machines around the world. A machine acts as a server and sends data (aka tasks) to these client computers, which they process and report back the result of the task computation. This gives rise to a crucial problem: how can we prevent malicious clients from damaging the outcome of the overall computation?

In this work we abstract this problem in the form of a distributed system consisting of a master fail-free processor and a collection of processors (workers) that can execute tasks; worker processors might act maliciously. Since each task returns a value, we want the master to accept only correct values with high probability. Furthermore, we assume that the service provided by the workers is not free (as opposed to the SETI@Home project). For each task that a worker executes, the master computer is charged with a work-unit. Therefore, considering a single task assigned to several workers, our goal is to have the master computer to accept the correct value of the task with high probability, with the smallest possible amount of work. We explore two ways of bounding the number of faulty processors and evaluate an algorithm that the master can run. Our preliminary analytical results show that it is possible to obtain high probability of correct acceptance with reasonable amount of work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

References

  1. Blough, D., Sullivan, G.: A comparison for voting strategies for fault-tolerant distributed systems. In: SRDS 1990, pp. 136–145 (1990)

    Google Scholar 

  2. Dwork, C., Halpern, J., Waarts, O.: Performing work efficiently in the presence of faults. Siam J. on Computing 27(5), 1457–1491 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  3. Fernández, A., Georgiou, C., López, L., Santos, A.: Reliably executing tasks in the presence of malicious processors. Technical Report (2005), http://gsyc.info/publicaciones/tr

  4. Fernández, A., Georgiou, C., Russell, A., Shvartsman, A.: The Do-All problem with Byzantine processor failures. Theoretical Computer Science 333(3), 433–454 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  5. Korpela, E., Werthimer, D., Anderson, D., Cobb, J., Lebofsky, M.: SETI@Home:Massively distributed computing for SETI. Computing in Science and Engineering 3(1), 78–83 (2001)

    Article  Google Scholar 

  6. Paquette, M., Pelc, A.: Optimal decision strategies in Byzantine environments. In: Kralovic, R., Sýkora, O. (eds.) SIROCCO 2004. LNCS, vol. 3104, pp. 245–254. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fernández, A., Georgiou, C., López, L., Santos, A. (2005). Reliably Executing Tasks in the Presence of Malicious Processors. In: Fraigniaud, P. (eds) Distributed Computing. DISC 2005. Lecture Notes in Computer Science, vol 3724. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11561927_36

Download citation

  • DOI: https://doi.org/10.1007/11561927_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29163-3

  • Online ISBN: 978-3-540-32075-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics