Skip to main content

On the Malicious Participants Problem in Computational Grid

  • Conference paper
Book cover Grid and Cooperative Computing (GCC 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3032))

Included in the following conference series:

Abstract

Computational Grid allows customers to submit tasks to service providers. To maintain the availability, fairness and performance, it is critical to protect Computational Grid systems from malicious participants. Current solutions to this problem assume that the system would contain either malicious consumers only or malicious service provider only. However, in the real world, both consumers and service providers may be malicious in a single computational grid system. We proposed a solution to this problem by ranking both side of participants.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Amir, Y., Awerbuch, B., et al.: A cost-benefit framework for online management of a metacomputing system. In: Proceedings of the First International Conference on Computation Economics (1998)

    Google Scholar 

  2. Anderson, David, P., Cobb, J., et al.: SETI@home: An Experiment in Public-Resource Computing. Communications of the ACM 45(11), 56–61 (2002)

    Article  Google Scholar 

  3. Brin, S., Page, L.: The Anatomy of a Large-Scale Hypertextual Web Search Engine, http://www-db.stanford.edu/backrub/google.html

  4. Cappello, P., Cristiansen, O.B., et al.: Market-Based Massively Parallel Internet Computing. In: Third working conference on Massively Parallel Programming Models (1997)

    Google Scholar 

  5. Chun, B.N., Culler, D.E.: Use-centric Performance Analysis of Market-based Cluster Batch Schedulers. In: Proceedings of the 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid, pp. 22–30 (2002)

    Google Scholar 

  6. Foster, I., Kesselman, C.: Globus: A Metacomputing Infrastructure Toolkit. Intl J. Supercomputer Applications 11(2), 115–128 (1997)

    Article  Google Scholar 

  7. Foster, I., Kesselman, C. (eds.): The Grid:Blueprint for a New Computing InfraStructure. Morgan Kaufmann, San Francisco (1999)

    Google Scholar 

  8. Foster, I., Kesselman, C., et al.: Grid Services for Distributed System Integration. Computer 35(6), 37–46 (2002)

    Article  MathSciNet  Google Scholar 

  9. Kakarontzas, G., Lalis, S.: A Market-based Protocol with Leasing Support for Globally Distributed Computing. In: Proceedings of the First IEEE/ACM International Symposium on Cluster Computing and the Grid, pp. 562–567 (2001)

    Google Scholar 

  10. Stiller, B., Gerke, J., et al.: Charging Distributed Services of a Computational Grid Architecutre. In: Proceedings of the First IEEE/ACM International Symposium on Cluster Computing and the Grid, pp. 596–601 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, W., Zheng, W., Yang, G. (2004). On the Malicious Participants Problem in Computational Grid. In: Li, M., Sun, XH., Deng, Qn., Ni, J. (eds) Grid and Cooperative Computing. GCC 2003. Lecture Notes in Computer Science, vol 3032. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24679-4_144

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24679-4_144

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-21988-0

  • Online ISBN: 978-3-540-24679-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics