• DocumentCode
    3316360
  • Title

    A framework for automatic and secure cycle stealing

  • Author

    Kelly, Wayne ; Roe, Paul

  • Author_Institution
    Queensland Univ. of Technol., Australia
  • fYear
    2004
  • fDate
    20-22 July 2004
  • Firstpage
    74
  • Lastpage
    80
  • Abstract
    Cycle stealing systems use idle PCs to create virtual supercomputers. Utilizing third party PCs in this way is very attractive but one fraught with problems. Firstly, writing applications is difficult without supporting middleware, the cycle stealing environment is highly volatile with machines coming and going at random. Secondly, cycle stealing applications and data need to be deployed and installed on third party machines. This requires considerable trust from third party users, if they are to donate their machines. Reports of file sharing programs such as Kazzaa carrying Trojan horses have made users understandably wary of running unknown third party code. This second problem is the focus of this paper; we describe the G2 middleware and how it is able to automatically and securely deploy and run code and associated data with minimal trust required from the user. This is achieved by leveraging the security and deployment features of Microsoft.NET and extending them to a cycle stealing system.
  • Keywords
    middleware; network operating systems; security of data; G2 middleware; Kazzaa; MicrosoftNET; Trojan horses; cycle stealing; file sharing; idle PC; third party machines; virtual supercomputers; Invasive software; Middleware; Peer to peer computing; Personal communication networks; Programming profession; Runtime; Supercomputers; Virtual machining; Web services; Writing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    High Performance Computing and Grid in Asia Pacific Region, 2004. Proceedings. Seventh International Conference on
  • Print_ISBN
    0-7695-2138-X
  • Type

    conf

  • DOI
    10.1109/HPCASIA.2004.1324018
  • Filename
    1324018