Title :
A framework for automatic and secure cycle stealing
Author :
Kelly, Wayne ; Roe, Paul
Author_Institution :
Queensland Univ. of Technol., Australia
Abstract :
Cycle stealing systems use idle PCs to create virtual supercomputers. Utilizing third party PCs in this way is very attractive but one fraught with problems. Firstly, writing applications is difficult without supporting middleware, the cycle stealing environment is highly volatile with machines coming and going at random. Secondly, cycle stealing applications and data need to be deployed and installed on third party machines. This requires considerable trust from third party users, if they are to donate their machines. Reports of file sharing programs such as Kazzaa carrying Trojan horses have made users understandably wary of running unknown third party code. This second problem is the focus of this paper; we describe the G2 middleware and how it is able to automatically and securely deploy and run code and associated data with minimal trust required from the user. This is achieved by leveraging the security and deployment features of Microsoft.NET and extending them to a cycle stealing system.
Keywords :
middleware; network operating systems; security of data; G2 middleware; Kazzaa; MicrosoftNET; Trojan horses; cycle stealing; file sharing; idle PC; third party machines; virtual supercomputers; Invasive software; Middleware; Peer to peer computing; Personal communication networks; Programming profession; Runtime; Supercomputers; Virtual machining; Web services; Writing;
Conference_Titel :
High Performance Computing and Grid in Asia Pacific Region, 2004. Proceedings. Seventh International Conference on
Print_ISBN :
0-7695-2138-X
DOI :
10.1109/HPCASIA.2004.1324018