User-Based CPU Verification Scheme for Public Cloud Computing

In this paper, a user-based CPU verification scheme is proposed for cloud cheating detection. In this scheme, a predefined computational task is constructed for the cloud to execute in our cheating detection process. Then we compare the difference of the actual execution time (recorded by the user) and the theoretical execution time, as to determine whether the cloud is cheating or not. A time-lock puzzle is introduced to construct the predefined computational task, so that the predefined computational task is guaranteed to be executed by the cloud. Our cheating detection process has a higher probability of detecting cloud cheating if using a larger predefined computational task, which in turn costs more time. Further analysis shows that, if the total detection time is limited, it is better to detect cloud cheating using small-scale and short-length cheating detecting processes multiple times, as opposed to large-scale and long-length processes a few times. Finally, the feasibility and validity of the proposed scheme is shown in the evaluations.

[1]  Kirk L. Kroeker,et al.  The evolution of virtualization , 2009, CACM.

[2]  Jon Watson,et al.  VirtualBox: bits and bytes masquerading as machines , 2008 .

[3]  Paul Hofmann,et al.  Cloud Computing: The Limits of Public Clouds for Business Applications , 2010, IEEE Internet Computing.

[4]  Benjamin Farley,et al.  More for your money: exploiting performance heterogeneity in public clouds , 2012, SoCC '12.

[5]  Eyal de Lara,et al.  SnowFlock: rapid virtual machine cloning for cloud computing , 2009, EuroSys '09.

[6]  Eike Kiltz,et al.  Practical Chosen Ciphertext Secure Encryption from Factoring , 2009, EUROCRYPT.

[7]  Ronald L. Rivest,et al.  Time-lock Puzzles and Timed-release Crypto , 1996 .

[8]  Manish Vachharajani,et al.  An efficient software transactional memory using commit-time invalidation , 2010, CGO '10.

[9]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[10]  Rajkumar Buyya,et al.  Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[11]  Nathan Regola,et al.  Recommendations for Virtualization Technologies in High Performance Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[12]  Martin Mauve,et al.  Offline Submission with RSA Time-Lock Puzzles , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[13]  Manuel Blum,et al.  A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..

[14]  David Nowak,et al.  On Formal Verification of Arithmetic-Based Cryptographic Primitives , 2009, ICISC.

[15]  Takeo Kanade,et al.  Information Security and Cryptology - ICISC 2008 , 2009 .

[16]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[17]  Yong Zhao,et al.  Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.

[18]  S. Vadhan,et al.  Time-Lock Puzzles in the Random Oracle , 2011 .