Modeling and performance evaluation of colluding attack in volunteer computing systems

Kan Watanabe, Nobuo Funabiki, Torn Nakanishi, Masaru Fukushi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

This paper proposes a model of a colluding attack in Volunteer Computing (VC), where some of participants are unreliable and may return incorrect results. The colluding attack is one of the most important issues to realize reliable VC because it may ruin the most basic assumption, i.e. "the majority in voting is correct". Especially, check-by-voting archives the largest efficiency by sorting reliable participants based on whether their results are the majority or not. Thus, if some incorrect results become the majority by colluding attack, it may have significant impacts on check-by-voting. In this paper, we perform a Monte Carlo simulation of VC using the proposed colluding model and evaluate the sabotage-tolerance performance of voting methods. Simulation results show that check-by-voting works well if colluding attack happens.

Original languageEnglish
Title of host publicationInternational MultiConference of Engineers and Computer Scientists, IMECS 2012
PublisherNewswood Limited
Pages1658-1663
Number of pages6
ISBN (Print)9789881925190
Publication statusPublished - Jan 1 2012
Event2012 International MultiConference of Engineers and Computer Scientists, IMECS 2012 - Kowloon, Hong Kong
Duration: Mar 14 2012Mar 16 2012

Publication series

NameLecture Notes in Engineering and Computer Science
Volume2196
ISSN (Print)2078-0958

Other

Other2012 International MultiConference of Engineers and Computer Scientists, IMECS 2012
Country/TerritoryHong Kong
CityKowloon
Period3/14/123/16/12

Keywords

  • Desktop Grids
  • Job Scheduling
  • Mathematical Modeling
  • Parallel Computing

ASJC Scopus subject areas

  • Computer Science (miscellaneous)

Fingerprint

Dive into the research topics of 'Modeling and performance evaluation of colluding attack in volunteer computing systems'. Together they form a unique fingerprint.

Cite this