Skip to main content

High Performance Computing by the Crowd

  • Chapter
  • First Online:
Intelligent Methods and Big Data in Industrial Applications

Part of the book series: Studies in Big Data ((SBD,volume 40))

  • 868 Accesses

Abstract

Computational techniques both from a software and hardware viewpoint are nowadays growing at impressive rates leading to the development of projects whose complexity could be quite challenging, e.g., bio-medical simulations. Tackling such high demand could be quite hard in many context due to technical and economic motivation. A good trade-off can be the use of collaborative approaches. In this paper, we address this problem in a peer to peer way. More in detail, we leverage the idling computational resources of users connected to a network. We designed a framework that allows users to share their CPU and memory in a secure and efficient way. Indeed, users help each others by asking the network computational resources when they face high computing demanding tasks. As we do not require to power additional resources for solving tasks (we better exploit unused resources already powered instead), we hypothesize a remarkable side effect at steady state: energy consumption reduction compared with traditional server farm or cloud based executions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.wikipedia.org.

  2. 2.

    https://answers.yahoo.com/.

  3. 3.

    https://www.mturk.com.

  4. 4.

    https://boinc.berkeley.edu/.

  5. 5.

    Our framework has to be robust against attacks from malicious users, analogously to every distributed computing systems [2] or distributed storage systems [7]. More in detail, we need to guarantee secure communication between clients and server, trusted software for remote execution and privacy for the intermediate computation. As regards the web communication between client and server are guaranteed by Secure Sockets Layer (SSL - https://tools.ietf.org/html/rfc6101) [11] in order to prevent Man-in-the-Middle Attacks [5].

  6. 6.

    Note that the credentials are included in each message, but as mentioned above we use the SSL protocol to avoid eavesdropping, tampering, or message forgery.

References

  1. Agrawal, D., et al.: Challenges and opportunities with big data. A community white paper developed by leading researchers across the United States (2012)

    Google Scholar 

  2. Bhatia, R.: Grid computing and security issues. Int. J. Sci. Res. Publ. (IJSRP) 3(8) (2013)

    Google Scholar 

  3. Borkar, V.R., Carey, M.J., Li, C.: Inside “Big Data Management”: ogres, onions, or parfaits? In: International Conference on Extending Database Technology, pp. 3–14 (2012)

    Google Scholar 

  4. Brew, A., Greene, D., Cunningham, P.: Using crowdsourcing and active learning to track sentiment in online media. In: Proceedings of the 2010 Conference on ECAI 2010: 19th European Conference on Artificial Intelligence, pp. 145–150 (2010)

    Google Scholar 

  5. Chen, Z., Guo, S., Duan, R., Wang, S.: Security analysis on mutual authentication against man-in-the-middle attack. In: 2009 First International Conference on Information Science and Engineering, pp. 1855–1858 (2009)

    Google Scholar 

  6. T. Economist: Data, data everywhere. The Economist (2010)

    Google Scholar 

  7. Firdhous, M.: Implementation of security in distributed systems - a comparative study. CoRR (2012). arXiv:abs/1211.2032

  8. Franklin, M.J., Kossmann, D., Kraska, T., Ramesh, S., Xin, R.: CrowdDB: answering queries with crowdsourcing. In: Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data, pp. 61–72

    Google Scholar 

  9. Harris, M.: Many-core GPU computing with NVIDIA CUDA. In: Proceedings of the 22nd Annual International Conference on Supercomputing, ICS ’08 (2008)

    Google Scholar 

  10. Howe, J.: Crowdsourcing: Why the Power of the Crowd is Driving the Future of Business, 1st edn. Crown Publishing Group, New York (2008)

    Google Scholar 

  11. Liu, N., Yang, G., Wang, Y., Guo, D.: Security analysis and configuration of SSL protocol. In: 2008 2nd International Conference on Anti-Counterfeiting, Security and Identification, pp. 216–219 (2008)

    Google Scholar 

  12. Liu, X., Lu, M., Ooi, B.C., Shen, Y., Wu, S., Zhang, M.: CDAS: a crowdsourcing data analytics system. Proc. VLDB Endow. 5(10), 1040–1051 (2012)

    Article  Google Scholar 

  13. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Freely available on the web (2008)

    Google Scholar 

  14. Nature: Big data. Nature (2008)

    Google Scholar 

  15. Nickolls, J., Buck, I., Garland, M., Skadron, K.: Scalable parallel programming with CUDA. Queue 6(2) (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elio Masciari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Cassavia, N., Flesca, S., Ianni, M., Masciari, E., Papuzzo, G., Pulice, C. (2019). High Performance Computing by the Crowd. In: Bembenik, R., Skonieczny, Ł., Protaziuk, G., Kryszkiewicz, M., Rybinski, H. (eds) Intelligent Methods and Big Data in Industrial Applications. Studies in Big Data, vol 40. Springer, Cham. https://doi.org/10.1007/978-3-319-77604-0_7

Download citation

Publish with us

Policies and ethics