Expected-Credibility-Based Job Scheduling for Reliable Volunteer Computing

This paper presents a proposal of an expected-credibility-based job scheduling method for volunteer computing (VC) systems with malicious participants who return erroneous results. Credibility-based voting is a promising approach to guaranteeing the computational correctness of VC systems. However, it relies on a simple round-robin job scheduling method that does not consider the jobs' order of execution, thereby resulting in numerous unnecessary job allocations and performance degradation of VC systems. To improve the performance of VC systems, the proposed job scheduling method selects a job to be executed prior to others dynamically based on two novel metrics: expected credibility and the expected number of results for each job. Simulation of VCs shows that the proposed method can improve the VC system performance up to 11%; It always outperforms the original round-robin method irrespective of the value of unknown parameters such as population and behavior of saboteurs.

[1]  Chris GauthierDickey,et al.  Result verification and trust-based scheduling in peer-to-peer grids , 2005, Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05).

[2]  Abhishek Chandra,et al.  Adaptive Reputation-Based Scheduling on Unreliable Distributed Infrastructures , 2007, IEEE Transactions on Parallel and Distributed Systems.

[3]  David P. Anderson,et al.  BOINC: a system for public-resource computing and storage , 2004, Fifth IEEE/ACM International Workshop on Grid Computing.

[4]  Gilles Fedak,et al.  Characterizing resource availability in enterprise desktop grids , 2007, Future Gener. Comput. Syst..

[5]  Luis F. G. Sarmenta Sabotage-tolerance mechanisms for volunteer computing systems , 2002, Future Gener. Comput. Syst..

[6]  Yu. A. Zuev On the Estimation of Efficiency of Voting Procedures , 1998 .

[7]  Andrew A. Chien,et al.  Scheduling Task Parallel Applications for Rapid Turnaround on Enterprise Desktop Grids , 2007, Journal of Grid Computing.

[8]  Bruno Sousa,et al.  Sabotage-tolerance and trust management in desktop grid computing , 2007, Future Gener. Comput. Syst..

[9]  Chong-Sun Hwang,et al.  Scheduling Scheme based on Dedication Rate in Volunteer Computing Environment , 2005, The 4th International Symposium on Parallel and Distributed Computing (ISPDC'05).

[10]  Satoshi Hirano,et al.  Bayanihan: building and studying web-based volunteer computing systems using Java , 1999, Future Gener. Comput. Syst..

[11]  Henri Casanova,et al.  Benefits and Drawbacks of Redundant Batch Requests , 2007, Journal of Grid Computing.

[12]  José Neuman de Souza,et al.  Detecting Malicious Manipulation in Grid Environments , 2006, 2006 18th International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD'06).

[13]  David P. Anderson,et al.  SETI@home: an experiment in public-resource computing , 2002, CACM.