IMDEA Networks Institute Publications Repository

Reliable Internet-based Master-Worker Computing in the Presence of Malicious Workers

Fernández Anta, Antonio and Georgiou, Chryssis and López, Luis and Santos, Agustín (2012) Reliable Internet-based Master-Worker Computing in the Presence of Malicious Workers. [Journal Articles]

PDF (Reliable Internet-based Master-Worker Computing in the Presence of Malicious Workers) - Published Version
Download (271Kb) | Preview


We consider a Master-Worker distributed system where a master processor assigns, over the Internet, tasks to a collection of n workers, which are untrusted and might act maliciously. In addition, a worker may not reply to the master, or its reply may not reach the master, due to unavailabilities or failures of the worker or the network. Each task returns a value, and the goal is for the master to accept only correct values with high probability. Furthermore, we assume that the service provided by the workers is not free; for each task that a worker is assigned, the master is charged with a work-unit. Therefore, considering a single task assigned to several workers, our objective is to have the master processor to accept the correct value of the task with high probability, with the smallest possible amount of work (number of workers the master assigns the task). We probabilistically bound the number of faulty processors by assuming a known probability p < 1/2 of any processor to be faulty. Our work demonstrates that it is possible to obtain, with provable analytical guarantees, high probability of correct acceptance with low work. In particular, we first show lower bounds on the minimum amount of (expected) work required, so that any algorithm accepts the correct value with probability of success 1 - ε, where ε ≪ 1 (e.g., 1/n). Then we develop and analyze two algorithms, each using a different decision strategy, and show that both algorithms obtain the same probability of success 1 - ε, and in doing so, they require similar upper bounds on the (expected) work. Furthermore, under certain conditions, these upper bounds are asymptotically optimal with respect to our lower bounds.

Item Type: Journal Articles
Uncontrolled Keywords: Volunteer computing; Malicious processors; Dependable computing; Public-resource computing; Task execution; Cost
Subjects: Q Science > Q Science (General)
Q Science > QA Mathematics > QA75 Electronic computers. Computer science
T Technology > T Technology (General)
T Technology > TA Engineering (General). Civil engineering (General)
T Technology > TK Electrical engineering. Electronics Nuclear engineering
Divisions: Faculty of Engineering, Science and Mathematics > School of Electronics and Computer Science
Depositing User: Systems Ad Systems Administrator
Date Deposited: 15 Feb 2012 15:51
Last Modified: 23 Apr 2014 11:38

Actions (login required)

View Item View Item