REXEC: A Decentralized, Secure Remote Execution Environment for Clusters

Author(s):  
Brent N. Chun ◽  
David E. Culler
2020 ◽  
Author(s):  
Pedro Paiva Alves ◽  
Paulo A. L. Rêgo ◽  
Fernando A. M. Trinta

As aplicações para dispositivos móveis tem evoluído possibilitando a realização das mais diversas atividades. Para auxiliar os dispositivos, a técnica de offloading computacional tem sido utilizada para migrar tarefas para servidores em nuvem com poder de processamento superior ou maior capacidade energética. Entretanto, quando indisponível tal infraestrutura ou quando a latência da comunicação é um empecilho para a execução do offloading, uma estratégia que pode ser utilizada é o offloading para um ambiente remoto de execução (do inglês, remote execution environment - REE), que pode ser inclusive outros dispositivos móveis próximos. A escolha de um REE é um processo complexo, pois a heterogeneidade dos dispositivos interfere no tempo de conclusão das tarefas migradas. Este trabalho apresenta um método para selecionar um REE que considera o contexto do usuário. Para validar a solução desenvolvida, uma arquitetura de software foi projetada e implementada, e experimentos foram executados.


2008 ◽  
Vol 37 (587) ◽  
Author(s):  
Mads Darø Kristensen

<p>This report describes the design and implementation of a mobile, peerto- peer, remote execution system called Scavenger. A peer running Scavenger is capable of automatically discovering available, unused computing resources in its vicinity, and, by means of mobile code, utilising these resources to its own good.<br />Designing a system such as Scavenger a number of challenges are raised. In this report only the two main challenges are presented: service discovery and mobile code security.<br />Service discovery in a fixed network is a well-documented process, but mobile service discovery is less so. Scavenger assumes nothing about its operating environment—it may be executing services on stationary as well as mobile peers—and it therefore needs a highly flexible service discovery protocol.</p><p>When working with mobile code, security becomes paramount since peers are executing unknown (and thus untrusted) code. Scavenger uses the Python programming language for its mobile code, and Python does not, like for example Java, have any built-in security models that enable the user to sandbox a Python process. When using such an ”insecure” programming language in a mobile code setting, other means of securing the code must be employed. This report describes the development of such a safe execution environment where mobile Python may be executed in a secure manner.</p>


Author(s):  
Mahalingam Ramkumar

Approaches for securing digital assets of information systems can be classified as active approaches based on attack models, and passive approaches based on system-models. Passive approaches are inherently superior to active ones. However, taking full advantage of passive approaches calls for a rigorous standard for a low-complexity-high-integrity execution environment for security protocols. We sketch broad outlines of mirror network (MN) modules, as a candidate for such a standard. Their utility in assuring real-world information systems is illustrated with examples.


2005 ◽  
Vol 47 (8) ◽  
pp. 565-574 ◽  
Author(s):  
Rod Fatoohi ◽  
Nihar Gokhale ◽  
Suja Viswesan

Sign in / Sign up

Export Citation Format

Share Document