Secure Remote Execution of Sequential Computations

We describe a scheme that secures the remote execution of sequential computations in grid-computing scenarios. To the best of our knowledge, this is the first contribution that addresses the security of generic sequential computations. By dividing sequential tasks into smaller subtasks and permuting them among participants, we show that our scheme facilitates the insertion of selective redundancy and/or pre-computed functions (ringers) that are indistinguishable from other computations. We analyze the security of this proposal and we demonstrate that our scheme enables the detection of individual and colluding malicious participants. In addition, we show that our scheme can be equally used to securely track the progress of remote execution. We further investigate the damages introduced by possible chaining of errors within the remote execution and we discuss recovery mechanisms to counter these challenges. We validate our findings both analytically and empirically via simulations.

[1]  Michael I. Baron,et al.  Probability and Statistics for Computer Scientists , 2013 .

[2]  Philippe Golle,et al.  Uncheatable Distributed Computations , 2001, CT-RSA.

[3]  Andreas Haeberlen,et al.  PeerReview: practical accountability for distributed systems , 2007, SOSP.

[4]  Samuel P. Midkiff,et al.  Lightweight Monitoring of the Progress of Remotely Executing Computations , 2005, LCPC.

[5]  Philippe Golle,et al.  Secure Distributed Computing in a Commercial Environment , 2002, Financial Cryptography.

[6]  Ernesto Damiani,et al.  A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.

[7]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[8]  Giovanni Vigna,et al.  Protecting Mobile Agents through Tracing , 1997 .

[9]  Gage Js,et al.  The great Internet Mersenne prime search. , 1998 .

[10]  Ghassan O. Karame,et al.  A Secure Hybrid Reputation Management System for Super-Peer Networks , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.

[11]  Hongxia Jin,et al.  Forensic analysis for tamper resistant software , 2003, 14th International Symposium on Software Reliability Engineering, 2003. ISSRE 2003..

[12]  Michael Greenacre,et al.  Book reviews: Correspondence analysis and data coding with Java and R. Fionn Murtagh. Chapman & Hall/CRC, 2005. Multidimensional nonlinear data analysis. Shizuhiko Nishiato. Chapman & Hall/CRC, 2006. , 2006 .

[13]  Saumya K. Debray,et al.  Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.

[14]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[15]  Doug Szajda,et al.  Hardening functions for large scale distributed computations , 2003, 2003 Symposium on Security and Privacy, 2003..

[16]  Wenliang Du,et al.  Uncheatable grid computing , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..

[17]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[18]  Michael T. Goodrich Pipelined algorithms to detect cheating in long-term grid computations , 2008, Theor. Comput. Sci..

[19]  Wayne A. Jansen,et al.  Mobile Agent Security , 1999 .

[20]  Manuel Blum,et al.  Software reliability via run-time result-checking , 1997, JACM.

[21]  M. Degroot,et al.  Probability and Statistics , 2021, Examining an Operational Approach to Teaching Probability.

[22]  Ghassan O. Karame,et al.  SuperTrust: a secure and efficient framework for handling trust in super-peer networks , 2007, PODC '07.