Abstract
We describe a scheme that secures the remote execution of sequential computations in grid-computing scenarios. To the best of our knowledge, this is the first contribution that addresses the security of generic sequential computations. By dividing sequential tasks into smaller subtasks and permuting them among participants, we show that our scheme facilitates the insertion of selective redundancy and/or pre-computed functions (ringers) that are indistinguishable from other computations. We analyze the security of this proposal and we demonstrate that our scheme enables the detection of individual and colluding malicious participants. In addition, we show that our scheme can be equally used to securely track the progress of remote execution. We further investigate the damages introduced by possible chaining of errors within the remote execution and we discuss recovery mechanisms to counter these challenges. We validate our findings both analytically and empirically via simulations.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
SETI@home, http://setiathome.ssl.berkeley.edu/
Distributed.Net, http://distributed.net/
The Great Internet Mersenne Prime Search, http://www.mersenne.org/prime.htm
Golle, P., Mironov, I.: Uncheatable Distributed Computations. In: Proceedings of the RSA Conference (2001)
Szajda, D., Lawson, B., Owen, J.: Hardening Functions for Large Scale Distributed Computations. In: Proceedings of the IEEE Symposium on Security and Privacy (2003)
Wasserman, H., Blum, M.: Software Reliability via Runtime Result-Checking. Journal of the ACM (1997)
Golle, P., Stubblebine, S.: Secure Distributed Computing in a Commercial Environment. In: Proceedings of the International Conference on Financial Cryptography (2001)
Sander, T., Tschudin, C.F.: Protecting Mobile Agents Against Malicious Hosts. Mobile Agent Security (1998)
Vigna, G.: Protecting Mobile Agents Through Tracing. In: Proceedings of the ECOOP Workshop on Mobile Object Systems (1997)
Du, W., Jia, J., Mangal, M., Murugesan, M.: Uncheatable Grid Computing. In: Proceedings of ICDCS (2004)
Goodrich, M.T.: Pipelined Algorithms to Detect Cheating in Long-Term Grid Computations. Theoretical Computer Science (2008)
Yang, S., Butt, A.R., Hu, Y., Midkiff, S.P.: Lightweight Monitoring of the Progress of Remotely Executing Computations. In: Proceedings of the International Workshop on Languages and Compilers for Parallel Computing (2007)
Jin, H., Lotspiech, J.: Forensic Analysis for Tamper Resistant Software. In: Proceedings of ISSRE (2003)
Linn, C., Debray, S.: Obfuscation of Executable Code to Improve Resistance to Static Disassembly. In: Proceedings of CCS (2003)
Kamvar, S., Schlosser, M., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: WWW 2003 (2003)
Damiani, E., Paraboschi, S., Samarati, P., Violante, F.: A Reputation-based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In: Proceedings of the ACM Conference on Computer and Communications Security (2005)
Dimitriou, T., Karame, G., Christou, I.: SuperTrust: A Secure and Efficient Framework for Handling Trust in Super Peer Networks. In: Proceedings of ACM PODC (2007)
Karame, G., Christou, I., Dimitriou, T.: A Secure Hybrid Reputation Management System for Super-Peer Networks. In: Proceedings of IEEE CCNC (2008)
Baron, M.: Probability and Statistics for Computer Science. Chapman & Hall/CRC, Boca Raton (2007)
Haeberlen, A., Kuznetsov, P., Druschel, P.: PeerReview: Practical Accountability for Distributed System. In: Proceedings of ACM SOSP (2007)
Douceur, J.: The Sybil Attack. In: Proceedings of the IPTPS Workshop, Cambridge, MA, USA (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Karame, G.O., Strasser, M., Čapkun, S. (2009). Secure Remote Execution of Sequential Computations. In: Qing, S., Mitchell, C.J., Wang, G. (eds) Information and Communications Security. ICICS 2009. Lecture Notes in Computer Science, vol 5927. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11145-7_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-11145-7_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11144-0
Online ISBN: 978-3-642-11145-7
eBook Packages: Computer ScienceComputer Science (R0)