Abstract
Security and fault-tolerance is a major issue for intensive parallel computing in pervasive environments with hardware errors or malicious acts that may alter the result. In [1,2] is presented a novel, robust and secure architecture able to offer intensive parallel computing in environments where resources may be corrupted. Some efficient result-checking mechanisms are used to certify the results of an execution. The architecture is based on a limited number of safe resources that host the checkpoint server (used to store the graph) and the verifiers able to securely re-execute piece of tasks in a trusted way. This article focus on the effective construction of strongly secured resources. Our approach combine both software and hardware components to cover the full spectrum of security constraints. The proposed computing platform is validated over a medical application and some experimental results are presented. © Springer-Verlag Berlin Heidelberg 2009.
Cite
CITATION STYLE
Varrette, S., Roch, J. L., Duc, G., & Keryell, R. (2009). Building secure resources to ensure safe computations in distributed and potentially corrupted environments. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5415 LNCS, pp. 211–222). https://doi.org/10.1007/978-3-642-00955-6_26
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.