Abstract
The demand for processing large amounts of data has increased over the last decade. As traditional one-processor machines have limited computational power, distributed systems consisting of multitude of cooperating processing units are used instead. An example of such a massive distributed cooperative computation is the SETI@Home project [5]. As the search for extraterrestrial intelligence involves the analysis of gigabytes of raw data that a fixed-size collection of machines would not be able to effectively carry out, the data are distributed to millions of voluntary machines around the world. A machine acts as a server and sends data (aka tasks) to these client computers, which they process and report back the result of the task computation. This gives rise to a crucial problem: how can we prevent malicious clients from damaging the outcome of the overall computation?
In this work we abstract this problem in the form of a distributed system consisting of a master fail-free processor and a collection of processors (workers) that can execute tasks; worker processors might act maliciously. Since each task returns a value, we want the master to accept only correct values with high probability. Furthermore, we assume that the service provided by the workers is not free (as opposed to the SETI@Home project). For each task that a worker executes, the master computer is charged with a work-unit. Therefore, considering a single task assigned to several workers, our goal is to have the master computer to accept the correct value of the task with high probability, with the smallest possible amount of work. We explore two ways of bounding the number of faulty processors and evaluate an algorithm that the master can run. Our preliminary analytical results show that it is possible to obtain high probability of correct acceptance with reasonable amount of work.
Similar content being viewed by others
References
Blough, D., Sullivan, G.: A comparison for voting strategies for fault-tolerant distributed systems. In: SRDS 1990, pp. 136–145 (1990)
Dwork, C., Halpern, J., Waarts, O.: Performing work efficiently in the presence of faults. Siam J. on Computing 27(5), 1457–1491 (1998)
Fernández, A., Georgiou, C., López, L., Santos, A.: Reliably executing tasks in the presence of malicious processors. Technical Report (2005), http://gsyc.info/publicaciones/tr
Fernández, A., Georgiou, C., Russell, A., Shvartsman, A.: The Do-All problem with Byzantine processor failures. Theoretical Computer Science 333(3), 433–454 (2005)
Korpela, E., Werthimer, D., Anderson, D., Cobb, J., Lebofsky, M.: SETI@Home:Massively distributed computing for SETI. Computing in Science and Engineering 3(1), 78–83 (2001)
Paquette, M., Pelc, A.: Optimal decision strategies in Byzantine environments. In: Kralovic, R., Sýkora, O. (eds.) SIROCCO 2004. LNCS, vol. 3104, pp. 245–254. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fernández, A., Georgiou, C., López, L., Santos, A. (2005). Reliably Executing Tasks in the Presence of Malicious Processors. In: Fraigniaud, P. (eds) Distributed Computing. DISC 2005. Lecture Notes in Computer Science, vol 3724. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11561927_36
Download citation
DOI: https://doi.org/10.1007/11561927_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29163-3
Online ISBN: 978-3-540-32075-3
eBook Packages: Computer ScienceComputer Science (R0)