DocumentCode
3316360
Title
A framework for automatic and secure cycle stealing
Author
Kelly, Wayne ; Roe, Paul
Author_Institution
Queensland Univ. of Technol., Australia
fYear
2004
fDate
20-22 July 2004
Firstpage
74
Lastpage
80
Abstract
Cycle stealing systems use idle PCs to create virtual supercomputers. Utilizing third party PCs in this way is very attractive but one fraught with problems. Firstly, writing applications is difficult without supporting middleware, the cycle stealing environment is highly volatile with machines coming and going at random. Secondly, cycle stealing applications and data need to be deployed and installed on third party machines. This requires considerable trust from third party users, if they are to donate their machines. Reports of file sharing programs such as Kazzaa carrying Trojan horses have made users understandably wary of running unknown third party code. This second problem is the focus of this paper; we describe the G2 middleware and how it is able to automatically and securely deploy and run code and associated data with minimal trust required from the user. This is achieved by leveraging the security and deployment features of Microsoft.NET and extending them to a cycle stealing system.
Keywords
middleware; network operating systems; security of data; G2 middleware; Kazzaa; MicrosoftNET; Trojan horses; cycle stealing; file sharing; idle PC; third party machines; virtual supercomputers; Invasive software; Middleware; Peer to peer computing; Personal communication networks; Programming profession; Runtime; Supercomputers; Virtual machining; Web services; Writing;
fLanguage
English
Publisher
ieee
Conference_Titel
High Performance Computing and Grid in Asia Pacific Region, 2004. Proceedings. Seventh International Conference on
Print_ISBN
0-7695-2138-X
Type
conf
DOI
10.1109/HPCASIA.2004.1324018
Filename
1324018
Link To Document