Performance evaluation of check-by-voting for colluding attack in volunteer computing systems

Kan Watanabe, Masaru Fukushi, Nobuo Funabiki, Toru Nakanishi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Volunteer computing (VC) is a type of Internet based parallel computing paradigm, which allows any participants in the Internet to contribute their idle computing resources towards solving large problems. In VC, sabotage-tolerance mechanism is mandatory to improve the reliability of computations because some malicious participants may sabotage their jobs by returning incorrect results. Then, this paper evaluates current sabotage-tolerance methods such as voting and presents an impact of colluding attack on the sabotage-tolerance performance. The colluding attack is one of the most important issues to realize reliable modern VC systems because it may ruin the fundamental assumption of voting, i.e., "the majority is correct". This becomes a big threat to the voting-based sabotage-tolerant methods which eliminate malicious participants based on whether their results are the majority or not. In this paper, we propose a colluding attack model, and conduct a detailed study for two major voting-based methods (i.e., M-first voting and check-by-voting) through a Monte Carlo simulation to reveal the sabotage-tolerance performance against colluding attacks. Our model introduces a colluding probability to cover various sabotaging and colluding scenarios. The simulation study shows that check-by-voting works well even if colluding attacks happen, while M-first voting does not.

Original languageEnglish
Title of host publicationIAENG Transactions on Engineering Technologies - Special Issue of the International MultiConference of Engineers and Computer Scientists 2012
Pages33-48
Number of pages16
DOIs
Publication statusPublished - Jan 24 2013
EventInternational MultiConference of Engineers and Computer Scientists 2012, IMECS 2012 - Hong Kong, Hong Kong
Duration: Mar 14 2012Mar 16 2012

Publication series

NameLecture Notes in Electrical Engineering
Volume186 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Other

OtherInternational MultiConference of Engineers and Computer Scientists 2012, IMECS 2012
CountryHong Kong
CityHong Kong
Period3/14/123/16/12

Keywords

  • Check-by-voting
  • Colluding attacks
  • Desktop grids
  • Majority voting
  • Sabotage-tolerance
  • Volunteer computing

ASJC Scopus subject areas

  • Industrial and Manufacturing Engineering

Fingerprint Dive into the research topics of 'Performance evaluation of check-by-voting for colluding attack in volunteer computing systems'. Together they form a unique fingerprint.

  • Cite this

    Watanabe, K., Fukushi, M., Funabiki, N., & Nakanishi, T. (2013). Performance evaluation of check-by-voting for colluding attack in volunteer computing systems. In IAENG Transactions on Engineering Technologies - Special Issue of the International MultiConference of Engineers and Computer Scientists 2012 (pp. 33-48). (Lecture Notes in Electrical Engineering; Vol. 186 LNEE). https://doi.org/10.1007/978-94-007-5651-9-3