Result Verification and Trust-based Scheduling in Open Peer-to-Peer Cycle Sharing Systems

Systems that seek to harvest idle cycles available throughout the Internet are vulnerable to hosts that fraudently accept computational tasks and then maliciously return arbitrary results. Current strategies employed by popular cooperative computing systems, such as SETI@Home, rely heavily on task replication to check results. However, result verification through replication suffers from two potential shortcomings: (1) susceptibility to collusion in which a group of malicious hosts conspire to return the same bad results and (2) high fixed overhead incurred by running redundant copies of the task. In this paper, we first propose a scheme called Quiz to combat collusion. The basic idea of Quiz is to insert indistinguishable quiz tasks with verifiable results known to the client within a package containing several normal tasks. The client can then accept or reject the normal task results based on the correctness of quiz results. Our second contribution is the promotion of trust-based task scheduling. By coupling a reputation system with the basic verification schemes Replication and Quiz a client can potentially avoid malicious hosts and also reduce the overhead of verification. Furthermore, by adjusting the degree of result verification according to the trust value of a particular host, a client can tailor the system to achieve the desired level of accuracy. Our mathematical analysis and simulation results show that Quiz greatly outperforms Replication in terms of accuracy and overhead under collusion assumptions. In non-collusion scenarios Replication is a better solution although Quiz also performs well. Reputation systems effectively improve the performance of both Quiz and Replication in a variety of cheating scenarios.

[1]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[2]  Amin Vahdat,et al.  SHARP: an architecture for secure resource peering , 2003, SOSP '03.

[3]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[4]  Francine Berman,et al.  Models and scheduling mechanisms for global computing applications , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.

[5]  Philippe Golle,et al.  Uncheatable Distributed Computations , 2001, CT-RSA.

[6]  Ami Marowka,et al.  The GRID: Blueprint for a New Computing Infrastructure , 2000, Parallel Distributed Comput. Pract..

[7]  Ling Liu,et al.  TrustMe: anonymous management of trust relationships in decentralized P2P systems , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[8]  Karl Aberer,et al.  Managing trust in a peer-2-peer information system , 2001, CIKM '01.

[9]  Seungjoon Lee,et al.  Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[10]  Keir Fraser,et al.  The Xenoserver computing infrastructure , 2003 .

[11]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[12]  Wenliang Du,et al.  Uncheatable grid computing , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..

[13]  Daniel Zappala,et al.  Cluster Computing on the Fly : P 2 P Scheduling of Idle Cycles in the Internet , 2004 .

[14]  James F. Doyle,et al.  Peer-to-Peer: harnessing the power of disruptive technologies , 2001, UBIQ.