Hardening distributed volunteer computations
Download
1 / 1

Hardening Distributed Volunteer Computations - PowerPoint PPT Presentation


  • 92 Views
  • Uploaded on

Hardening Distributed Volunteer Computations. Distributed Volunteer Computing. A. C. Welcome to the Internet, my friend. How can I help you?. CAGGATCTCAAGC. 2351. 2351. 1624. 1624. CAGCATATCACGT. 2323. 2323. 1352. 1352. Participants (Bob). “Alice”. “Bob 1”. “Bob 2”.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Hardening Distributed Volunteer Computations' - magee-workman


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Hardening distributed volunteer computations
Hardening Distributed Volunteer Computations

Distributed Volunteer Computing

A

C

Welcome to the

Internet, my friend.

How can I help you?

CAGGATCTCAAGC

2351

2351

1624

1624

CAGCATATCACGT

2323

2323

1352

1352

Participants (Bob)

“Alice”

“Bob 1”

“Bob 2”

Supervisor (Alice)

http://dvc.richmond.edu

  • The Setting

    • This research investigates the protection of computation integrity and enhancement of data privacy for applications executed on distributed computing platforms that utilize the spare processor cycles of computers connected to the Internet. The goal of the project is to provide computation supervisors with quantifiable protection and privacy mechanisms tailored to application and platform specific constraints. The project considers existing platforms, which prohibit participating computers ("participants") from communicating with other participants, as well as potential future hierarchical platforms that permit communication among participants and allow dynamic variation of platform topology.

  • The approach to the problem of computation integrity consists of probabilistic verification and novel application of artificial intelligence mechanisms for detecting anomalous behavior. The approach to data privacy is based on obscuring data values while maintaining sufficient output information for identifying specific important data from among a vast data set. Access to more secure distributed volunteer computing platforms will potentially benefit researchers from a variety of disciplines, including biology, chemistry, math, finance, medicine, climatology, and evolutionary theory.

Approach

Application and Platform Taxonomy

AI Methods for Detecting Malicious Activity

Enhanced Privacy via obscured data values

Application and Platform Specific Security Taxonomy

  • Enhanced Platforms and Protection Measures:

    • Hierarchical: Communication between Participants

    • Dynamic Topology

    • Task Heterogeneous

  • People

  • PIs

  • Barry Lawson

  • Jason Owen

  • Doug Szajda (PI)

  • Students

  • Matt King

  • Mike Pohl

  • Andy White

  • Brittany Williams

Improved Collusion Resistance, Fewer Tasks:

Genetic Sequence Privacy Example:

Participants compare ``offsets’’

T1

T2

T3

T4

NSF Award IIS-0524239:

Ensuring Computation Integrity in Distributed Volunteer Computing Platforms

T5

T6


ad