Using virtualization technologies to protect software and data in volunteer computing systems
Vestnik Sankt-Peterburgskogo universiteta. Prikladnaâ matematika, informatika, processy upravleniâ, Tome 16 (2020) no. 1, pp. 62-72
Cet article a éte moissonné depuis la source Math-Net.Ru

Voir la notice de l'article

When solving computational problems, research teams often use computational resources that are provided for this by various organizations or individual volunteers. Software and data used by the research team may be a subject of intellectual property. For this reason, it becomes relevant to protect software and data from potential intruders who can join the project under the guise of volunteers. The article provides an overview and an analysis of existing approaches to overcome this problem in the general case. The possibilities of the BOINC infrastructure, relevant for the development of various information security scenarios, are considered in detail. The concept of protecting data from unauthorized access, based on the integration of the client side of BOINC with the VirtualBox system, is proposed.
Keywords: protection of information, grid-systems, volunteer computing, BOINC, virtualization, VirtualBox.
@article{VSPUI_2020_16_1_a5,
     author = {N. P. Khrapov},
     title = {Using virtualization technologies to protect software and data in volunteer computing systems},
     journal = {Vestnik Sankt-Peterburgskogo universiteta. Prikladna\^a matematika, informatika, processy upravleni\^a},
     pages = {62--72},
     year = {2020},
     volume = {16},
     number = {1},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/VSPUI_2020_16_1_a5/}
}
TY  - JOUR
AU  - N. P. Khrapov
TI  - Using virtualization technologies to protect software and data in volunteer computing systems
JO  - Vestnik Sankt-Peterburgskogo universiteta. Prikladnaâ matematika, informatika, processy upravleniâ
PY  - 2020
SP  - 62
EP  - 72
VL  - 16
IS  - 1
UR  - http://geodesic.mathdoc.fr/item/VSPUI_2020_16_1_a5/
LA  - ru
ID  - VSPUI_2020_16_1_a5
ER  - 
%0 Journal Article
%A N. P. Khrapov
%T Using virtualization technologies to protect software and data in volunteer computing systems
%J Vestnik Sankt-Peterburgskogo universiteta. Prikladnaâ matematika, informatika, processy upravleniâ
%D 2020
%P 62-72
%V 16
%N 1
%U http://geodesic.mathdoc.fr/item/VSPUI_2020_16_1_a5/
%G ru
%F VSPUI_2020_16_1_a5
N. P. Khrapov. Using virtualization technologies to protect software and data in volunteer computing systems. Vestnik Sankt-Peterburgskogo universiteta. Prikladnaâ matematika, informatika, processy upravleniâ, Tome 16 (2020) no. 1, pp. 62-72. http://geodesic.mathdoc.fr/item/VSPUI_2020_16_1_a5/

[1] Berkeley Open Infrastructure for Network Computing, (accessed: 20.12.2019) https://boinc.berkeley.edu

[2] Ch. Li, A. Raghunathan, N. K. Jha, “Secure virtual machine execution under an untrusted management OS”, IEEE 3rd International Conference on Cloud Computing (Miami, 2010), 172–179

[3] E. E. Ivashko, “Enterprise desktop grids”, CEUR Workshop Proceedings, 1502, 2015, 16–21

[4] A. P. Afanasiev, I. V. Bychkov, M. O. Manzyuk, M. A. Posypkin, A. A. Semenov, O. S. Zaikin, “Technology for integrating idle computing cluster resources into volunteer computing projects”, 5th International Workshop on Computer Science and Engineering: Information Processing and Control Engineering, WCSE 2015-IPCE (Moscow, 2015), 109–114

[5] A. P. Afanasiev, I. V. Bychkov, O. S. Zaikin, M. O. Manzyuk, M. A. Posypkin, A. A. Semenov, “Concept of a multitask grid system with a flexible allocation of idle computational resources of supercomputers”, Journal of Computer and Systems Sciences International, 56:4 (2017), 701–707 | DOI

[6] A. C. Marosi, J. Kovacs, P. K. Kacsuk, “Towards a volunteer cloud system”, Future Generation Computer Systems, 29:6 (2013), 1442–1451 | DOI

[7] WrapperApp BOINC, (accessed: 18.03.2019) https://boinc.berkeley.edu/trac/wiki/WrapperApp

[8] N. P. Khrapov, V. V. Rozen, A. I. Samtsevich, M. A. Posypkin, V. A. Sukhomlin, A. R. Oganov, “Using virtualization to protect the proprietary material science applications in volunteer computing”, Open Engineering, 8 (2018), 57–60 | DOI