TY - GEN
T1 - Performance evaluation of check-by-voting for colluding attack in volunteer computing systems
AU - Watanabe, Kan
AU - Fukushi, Masaru
AU - Funabiki, Nobuo
AU - Nakanishi, Toru
N1 - Copyright:
Copyright 2021 Elsevier B.V., All rights reserved.
PY - 2013
Y1 - 2013
N2 - Volunteer computing (VC) is a type of Internet based parallel computing paradigm, which allows any participants in the Internet to contribute their idle computing resources towards solving large problems. In VC, sabotage-tolerance mechanism is mandatory to improve the reliability of computations because some malicious participants may sabotage their jobs by returning incorrect results. Then, this paper evaluates current sabotage-tolerance methods such as voting and presents an impact of colluding attack on the sabotage-tolerance performance. The colluding attack is one of the most important issues to realize reliable modern VC systems because it may ruin the fundamental assumption of voting, i.e., "the majority is correct". This becomes a big threat to the voting-based sabotage-tolerant methods which eliminate malicious participants based on whether their results are the majority or not. In this paper, we propose a colluding attack model, and conduct a detailed study for two major voting-based methods (i.e., M-first voting and check-by-voting) through a Monte Carlo simulation to reveal the sabotage-tolerance performance against colluding attacks. Our model introduces a colluding probability to cover various sabotaging and colluding scenarios. The simulation study shows that check-by-voting works well even if colluding attacks happen, while M-first voting does not.
AB - Volunteer computing (VC) is a type of Internet based parallel computing paradigm, which allows any participants in the Internet to contribute their idle computing resources towards solving large problems. In VC, sabotage-tolerance mechanism is mandatory to improve the reliability of computations because some malicious participants may sabotage their jobs by returning incorrect results. Then, this paper evaluates current sabotage-tolerance methods such as voting and presents an impact of colluding attack on the sabotage-tolerance performance. The colluding attack is one of the most important issues to realize reliable modern VC systems because it may ruin the fundamental assumption of voting, i.e., "the majority is correct". This becomes a big threat to the voting-based sabotage-tolerant methods which eliminate malicious participants based on whether their results are the majority or not. In this paper, we propose a colluding attack model, and conduct a detailed study for two major voting-based methods (i.e., M-first voting and check-by-voting) through a Monte Carlo simulation to reveal the sabotage-tolerance performance against colluding attacks. Our model introduces a colluding probability to cover various sabotaging and colluding scenarios. The simulation study shows that check-by-voting works well even if colluding attacks happen, while M-first voting does not.
KW - Check-by-voting
KW - Colluding attacks
KW - Desktop grids
KW - Majority voting
KW - Sabotage-tolerance
KW - Volunteer computing
UR - http://www.scopus.com/inward/record.url?scp=84872579214&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84872579214&partnerID=8YFLogxK
U2 - 10.1007/978-94-007-5651-9_3
DO - 10.1007/978-94-007-5651-9_3
M3 - Conference contribution
AN - SCOPUS:84872579214
SN - 9789400756236
T3 - Lecture Notes in Electrical Engineering
SP - 33
EP - 48
BT - IAENG Transactions on Engineering Technologies - Special Issue of the International MultiConference of Engineers and Computer Scientists 2012
PB - Springer Verlag
T2 - International MultiConference of Engineers and Computer Scientists 2012, IMECS 2012
Y2 - 14 March 2012 through 16 March 2012
ER -