A Framework for Automatic and Secure Cycle Stealing

  • Authors:
  • Wayne Kelly;Paul Roe

  • Affiliations:
  • Queensland University of Technology;Queensland University of Technology

  • Venue:
  • HPCASIA '04 Proceedings of the High Performance Computing and Grid in Asia Pacific Region, Seventh International Conference
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Cycle stealing systems use idle PCs to create virtual supercomputers. Utilizing third party PCs in this way is very attractive but one fraught with problems. Firstly writing applications is difficult without supporting middleware, the cycle stealing environment is highly volatile with machines coming and going at random. Secondly cycle stealing applications and data need to be deployed and installed on third party machines. This requires considerable trust from third party users, if they are to donate their machines. Reports of file sharing programs such as Kazzaa carrying Trojan horses have made users understandably wary of running unknown third party code. This second problem is the focus of this paper; we describe the G2 middleware and how it is able to automatically and securely deploy and run code and associated data with minimal trust required from the user. This is achieved by leverage the security and deployment features of Microsoft .NET and extending them to a cycle stealing system.