Skip to main content

Trustless Grid Computing in ConCert

  • Conference paper
  • First Online:
Grid Computing — GRID 2002 (GRID 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2536))

Included in the following conference series:

Abstract

We believe that fundamental to the establishment of a grid computing framework where all (not just large organizations) are able to effectively tap into the resources available on the global network is the establishment of trust between grid application developers and resource donors. Resource donors must be able to trust that their security, safety, and privacy policies will be respected by programs that use their systems. In this paper, we present a novel solution based on the notion of certified code that upholds safety, security, and privacy policies by examining intrinsic properties of code. Certified code complements authentication and provides a foundation for a safe, secure, and efficient framework that executes native code. We describe the implementation of such a framework known as the ConCert software.

The ConCert Project is supported by the National Science Foundation under grant ITR/SY+SI 0121633: “Language Technology for Trustless Software Dissemination”.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Andrew Appel. Compiling With Continuations. Cambridge University Press, Cambridge, 1992.

    Google Scholar 

  2. Andrew W. Appel and Edward W. Felten. Proof-carrying authentication. In G. Tsudik, editor, Proceedings of the 6th Conference on Computer and Communications Security, pages 52–62, Singapore, November 1999. ACM Press.

    Google Scholar 

  3. Robert D. Blumofe and Philip A. Lisiecki. Adaptive and reliable parallel computing on networks of workstations. In USENIX 1997 Annual Technical Conference on UNIX and Advanced Computing Systems, pages 133–147, Anaheim, California, 1997.

    Google Scholar 

  4. Gilad Bracha, Martin Odersky, David Stoutamire, and Philip Wadler. Making the future safe for the past: Adding genericity to the JavaTM programming language. In Object Oriented Programming: Systems, Languages, and Applications (OOPSLA), pages 183–200, Vancouver, British Columbia, October 1998.

    Google Scholar 

  5. Peter Cappello, Bernd Christiansen, Mihai F. Ionescu, Michael O. Neary, Klaus E. Schauser, and Daniel Wu. Javelin: Internet-based parallel computing using Java. In ACM Workshop on Java for Science and Engineering Computation, Las Vegas, Nevada, June 1997.

    Google Scholar 

  6. Tushar Deepak Chandra and Sam Toueg. Unreliable failure detectors for reliable distributed systems. Journal of the ACM, 43(2):225–267, March 1996.

    Article  MATH  MathSciNet  Google Scholar 

  7. Bor-Yuh Evan Chang. Iktara in ConCert: Realizing a certified grid computing framework from a programmer’s perspective. Technical Report CMU-CS-02-150, Carnegie Mellon University, June 2002. Undergraduate honors thesis.

    Google Scholar 

  8. Clip2 Distributed Search Services. The Gnutella protocol specification v0.4, September 2000. URL: http://www.gnutella.co.uk/library/pdf/gnutella protocol 0.4.pdf.

  9. Karl Crary and Stephanie Weirich. Resource bound certification. In Twenty-Seventh ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 184–198, Boston, Massachusetts, January 2000.

    Google Scholar 

  10. David E. Culler, Jaswinder Pal Singh, and Anoop Gupta. Parallel Computer Architecture: A Hardware/Software Approach. Morgan Kaufmann, San Francisco, California, 1999.

    Google Scholar 

  11. Margaret DeLap. Implementing a framework for certified grid computing. Technical Report CMU-CS-02-151, Carnegie Mellon University, June 2002. Undergraduate honors thesis.

    Google Scholar 

  12. Ian Foster and Carl Kesselman. The Globus toolkit. In Ian Foster and Carl Kesselman, editors, The Grid: Blueprint for a New Computing Infrastructure, chapter 11, pages 259–278. Morgan Kaufmann, San Francisco, California, 1999.

    Google Scholar 

  13. Neal Glew and Greg Morrisett. Type-safe linking and modular assembly language. In Twenty-Sixth ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 250–261, San Antonio, Texas, January 1999.

    Google Scholar 

  14. Li Gong, Marianne Mueller, Hemma Prafullchandra, and Roland Schemers. Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2. In USENIX Symposium on Internet Technologies and Systems, Monterey, California, December 1997.

    Google Scholar 

  15. James Gosling, Bill Joy, Guy Steele, and Gilad Bracha. The JavaTM Language Specification. Addison-Wesley, second edition, 2000.

    Google Scholar 

  16. Paul A. Gray and Vaidy S. Sunderam. Metacomputing with the IceT system. International Journal of High Performance Computing Applications, 13(3):241–252, 1999.

    Article  Google Scholar 

  17. Andrew S. Grimshaw and William A. Wulf. Legion: The next logical step toward the world-wide virtual computer. Communications of the ACM, 40(1):39–45, January 1997.

    Article  Google Scholar 

  18. Nevin Heintze and Jon G. Riecke. The SLam calculus: Programming with secrecy and integrity. In Twenty-Fifth ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 365–377, San Diego, California, January 1998.

    Google Scholar 

  19. ICFP. The third annual ICFP programming contest, 2000. URL: http://www.cs.cornell.edu/icfp/.

  20. Tim Lindholm and Frank Yellin. The JavaTM Virtual Machine Specification. Addison-Wesley, second edition, 1999.

    Google Scholar 

  21. Steven Lucco, Oliver Sharp, and Robert Wahbe. Omniware: A universal substrate for web programming. In Fourth International World Wide Web Conference, pages 359–368, Boston, Massachusetts, December 1995.

    Google Scholar 

  22. Robin Milner, Mads Tofte, Robert Harper, and David MacQueen. The Definition of Standard ML (Revised). MIT Press, Cambridge, Massachusetts, 1997.

    Google Scholar 

  23. Greg Morrisett, Karl Crary, Neal Glew, Dan Grossman, Richard Samuels, Frederick Smith, David Walker, Stephanie Weirich, and Steve Zdancewic. TALx86: A realistic typed assembly language. In 1999 ACM SIGPLAN Workshop on Compiler Support for System Software, pages 25–35, Atlanta, Georgia, May 1999.

    Google Scholar 

  24. Greg Morrisett, Karl Crary, Neal Glew, and David Walker. Stack-based typed assembly language. Journal of Functional Programming, 12(1):43–88, January 2002.

    Article  MATH  MathSciNet  Google Scholar 

  25. Greg Morrisett, David Walker, Karl Crary, and Neal Glew. From System F to typed assembly language. ACM Transactions on Programming Languages and Systems, 21(3):527–568, May 1999.

    Article  Google Scholar 

  26. Andrew C. Myers. Jflow: Practical mostly-static information flow control. In Twenty-Sixth ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 228–241, San Antonio, Texas, January 1999.

    Google Scholar 

  27. George C. Necula. Proof-carrying code. In Twenty-Fourth ACM SIGPLANSIGACT Symposium on Principles of Programming Languages, pages 106–119, Paris, France, January 1997.

    Google Scholar 

  28. George C. Necula and Peter Lee. Safe kernel extensions without run-time checking. In Second Symposium on Operating Systems Design and Implementation, pages 229–243, Seattle, Washington, October 1996.

    Google Scholar 

  29. George C. Necula and Peter Lee. Safe, untrusted agents using proof-carrying code. In Giovanni Vigna, editor, Special Issue on Mobile Agent Security, volume 1419 of Lecture Notes in Computer Science, pages 61–91. Springer-Verlag, October 1997.

    Google Scholar 

  30. Jordan Ritter. Why Gnutella can’t scale. No, really., February 2001. URL: http://www.darkridge.com/~jpr5/doc/gnutella.html.

  31. Luis F. G. Sarmenta. Bayanihan: Web-based volunteer computing using Java. In Second International Conference on World-Wide Computing and its Applications, pages 444–461, March 1998.

    Google Scholar 

  32. Luis F. G. Sarmenta and Satoshi Hirano. Bayanihan: Building and studying webbased volunteer computing systems using Java. Future Generation Computer Systems, 15(5–6):675–686, 1999. Special Issue on Metacomputing.

    Article  Google Scholar 

  33. Robert Wahbe, Steven Lucco, Thomas E. Anderson, and Susan L. Graham. Efficient software-based fault isolation. In Fourteenth ACM Symposium on Operating Systems Principles, pages 203–216, December 1993.

    Google Scholar 

  34. Steve Zdancewic and Andrew C. Myers. Confidentiality and integrity with untrusted hosts. Technical Report 2000-1810, Cornell University, 2000.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Evan Chang, BY. et al. (2002). Trustless Grid Computing in ConCert. In: Parashar, M. (eds) Grid Computing — GRID 2002. GRID 2002. Lecture Notes in Computer Science, vol 2536. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36133-2_11

Download citation

  • DOI: https://doi.org/10.1007/3-540-36133-2_11

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00133-1

  • Online ISBN: 978-3-540-36133-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics