EconPapers    
Economics at your fingertips  
 

Security and privacy threats to volunteer computing

J.H. Abawajy

International Journal of Critical Infrastructures, 2008, vol. 4, issue 3, 245-255

Abstract: The vision of volunteer computing is to provide large scale computational infrastructure by using dynamic collections of donated desktop computers. There have been many works that highlighted the significant benefits of volunteer computing but little on the security and privacy threats associated with its exploitation. However, volunteer computing is vulnerable to a variety of attacks and presents numerous significant security threats to the stakeholders. This paper presents security and privacy threat taxonomy along with the security features developed to cope with such threats.

Keywords: volunteer computing; security threats; privacy threats; attacks; parallel computing; security defence; computational infrastructure; critical infrastructures. (search for similar items in EconPapers)
Date: 2008
References: Add references at CitEc
Citations:

Downloads: (external link)
http://www.inderscience.com/link.php?id=17439 (text/html)
Access to full text is restricted to subscribers.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:ids:ijcist:v:4:y:2008:i:3:p:245-255

Access Statistics for this article

More articles in International Journal of Critical Infrastructures from Inderscience Enterprises Ltd
Bibliographic data for series maintained by Sarah Parker ().

 
Page updated 2025-03-19
Handle: RePEc:ids:ijcist:v:4:y:2008:i:3:p:245-255