Securing Distributed Computations in a Commercial Environment Philippe Golle, Stanford University Stuart Stubblebine, CertCo.

Slides:



Advertisements
Similar presentations
Computational Privacy. Overview Goal: Allow n-private computation of arbitrary funcs. –Impossible in information-theoretic setting Computational setting:
Advertisements

Cryptography and Game Theory: Designing Protocols for Exchanging Information Gillat Kol and Moni Naor.
Incentivize Crowd Labeling under Budget Constraint
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
Fall 2008 Version Professor Dan C. Jones FINA 4355 Class Problem.
Chapter 5 Fundamental Algorithm Design Techniques.
A Prior-Free Revenue Maximizing Auction for Secondary Spectrum Access Ajay Gopinathan and Zongpeng Li IEEE INFOCOM 2011, Shanghai, China.
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
SecureMR: A Service Integrity Assurance Framework for MapReduce Wei Wei, Juan Du, Ting Yu, Xiaohui Gu North Carolina State University, United States Annual.
LOAD BALANCING IN A CENTRALIZED DISTRIBUTED SYSTEM BY ANILA JAGANNATHAM ELENA HARRIS.
Sheng Xiao, Weibo Gong and Don Towsley,2010 Infocom.
Software Certification and Attestation Rajat Moona Director General, C-DAC.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Traitor Tracing Vijay Ramachandran CS 655: E-commerce Foundations October 10, 2000.
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Distributed Computing Group TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA Distributed Asymmetric Verification.
Smart Redundancy for Distributed Computation George Edwards Blue Cell Software, LLC Yuriy Brun University of Washington Jae young Bang University of Southern.
1 How to securely outsource cryptographic computations Susan Hohenberger and Anna Lysyanskaya TCC2005.
Robust Mechanisms for Information Elicitation Aviv Zohar & Jeffrey S. Rosenschein The Hebrew University.
A Probabilistic Approach to Collaborative Multi-robot Localization Dieter Fox, Wolfram Burgard, Hannes Kruppa, Sebastin Thrun Presented by Rajkumar Parthasarathy.
1-1 Incentive Mechanisms for Large Collaborative Resource Sharing Objectives:  Why Resource harnessing  Examples of resource harnessing  Grid computing.
Anonymizing Web Services Through a Club Mechanism With Economic Incentives Mamata Jenamani Leszek Lilien Bharat Bhargava Department of Computer Sciences.
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Hardening Functions for Large-Scale Distributed Computations Doug Szajda Barry Lawson Jason Owen 1.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Robust Network Supercomputing with Malicious Processes (Reliably Executing Tasks Upon Estimating the Number of Malicious Processes) Kishori M. Konwar*
Ragesh Jaiswal Indian Institute of Technology Delhi Threshold Direct Product Theorems: a survey.
Yongzhi Wang, Jinpeng Wei VIAF: Verification-based Integrity Assurance Framework for MapReduce.
Computer Science Department University of Pittsburgh 1 Evaluating a DVS Scheme for Real-Time Embedded Systems Ruibin Xu, Daniel Mossé and Rami Melhem.
Trust-Aware Optimal Crowdsourcing With Budget Constraint Xiangyang Liu 1, He He 2, and John S. Baras 1 1 Institute for Systems Research and Department.
CCAN: Cache-based CAN Using the Small World Model Shanghai Jiaotong University Internet Computing R&D Center.
Scheduling policies for real- time embedded systems.
Rational Cryptography Some Recent Results Jonathan Katz University of Maryland.
Incentives for Sharing in Peer-to-Peer Networks By Philippe Golle, Kevin Leyton-Brown, Ilya Mironov, Mark Lillibridge.
Copyright 2010, The World Bank Group. All Rights Reserved. Managing Coding Operations Section B 1.
Identity based signature schemes by using pairings Parshuram Budhathoki Department of Mathematical Science FAU 02/21/2013 Cyber Security Seminar, FAU.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
1 Privacy Aware Incentive Mechanism to Collect Mobile Data While Preventing Duplication Junggab Son*, Donghyun Kim*, Rasheed Hussain**, Sung-Sik Kwon*,
多媒體網路安全實驗室 Anonymous Authentication Systems Based on Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: Networked Digital Technologies,
ICICS2002, Singapore 1 A Group Signature Scheme Committing the Group Toru Nakanishi, Masayuki Tao, and Yuji Sugiyama Dept. of Communication Network Engineering.
Why a Commercial Provider should Join the Academic Cloud Federation David Blundell Managing Director 100 Percent IT Ltd Simple, Flexible, Reliable.
Database Laboratory Regular Seminar TaeHoon Kim Article.
PDEVS Protocol Performance Prediction using Activity Patterns with Finite Probabilistic DEVS DEMO L. Capocchi, J.F. Santucci, B.P. Zeigler University of.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Toward An Understanding of Self-Organization of Markets Yougui Wang Department of Systems Science, School of Management, Beijing Normal University, Beijing.
OPERATING SYSTEMS CS 3502 Fall 2017
Job Search: External and Internal
Job Scheduling in a Grid Computing Environment
CLUSTER COMPUTING Presented By, Navaneeth.C.Mouly 1AY05IS037
Verification and Testing
Some slides borrowed from Philippe Golle, Markus Jacobson
Quick reviews / corrections
The Matching Hypothesis
Grid Computing Colton Lewis.
Modern symmetric-key Encryption
Cloud Computing By P.Mahesh
Lottery Scheduling Ish Baid.
Multistep Processing of a User Program
Designing Mechanisms for Reliable Internet-based Computing
Fault Tolerance Distributed Web-based Systems
Main Memory Background Swapping Contiguous Allocation Paging
Discrete Event Simulation - 4
Organisational NRW Management
Cryptography Lecture 5.
Lecture 3: Main Memory.
Foundations and Definitions
Presentation transcript:

Securing Distributed Computations in a Commercial Environment Philippe Golle, Stanford University Stuart Stubblebine, CertCo

580,000 active participants 565,800 years of CPU time since TeraFLOPs / sec Example of a Distributed Computation

Commercialization: supply A dozen of companies have recruited thousands of participants $100 million in venture funding in (with

Commercialization: demand Super-computing market: $2 billion / year Computationally intensive parallelizable projects: –Drug design research –Mathematical research –Economic simulations –Digital entertainment

Cheaters! "Fifty percent of the project's resources have been spent dealing with security problems" "the really hard part has to do with verifying computational results" David Anderson, director.

Overview Related work Model –Organization of a distributed computation –Security framework Our scheme –Basic scheme –Security properties, overhead –Variants Conclusion

Related Work Objective: ensure the correct execution of a distributed computation in a commercial environment. Cryptographic approach –The focus is on verifying computations. –The goal is to design efficient and general verification procedures. –Numerous results: program checkers, proofs of work, … –Applications severely limited. Game-theory approach –The goal is to create economic incentives for participants to return correct results. –Black-box computations

Dramatis Personae Trusted supervisor –Maintains a pool of registered participants –Bids for large computations –Divides the computation into tasks that are assigned to participants –Collects the results and distributes payment to the participants –Example: Distributed.net, Entropia.com, etc… Untrusted participants – May range from large companies to individual users – Participants are anonymous (No “real world” leverage) – Participants may collude. We distinguish between real-world entities (agents) and anonymous participants. – Participants may leave the computation at any time, either temporarily or for good.

Organization Distribution of tasks –The unit of computation is a task –Assumption: all tasks have the same size and can be run by any participant within the same time bounds. –The supervisor runs a probabilistic algorithm to assign tasks to participants. –The supervisor keeps track of who did what

Security(1) Definition: a computation is secure if no rational, non-risk- seeking participant ever cheats. Collusion may occur only before tasks are assigned. A participant has 3 choices: –Request a computation and do it –Request a computation and NOT do it –Take a leave Assumption: all errors are malicious

Utility function of an agent Security condition: ( α +E)P – L(1-P) < 0 where P is the probability that cheating is undetected – L α + E Run the computation Cheat and “guess” the result α : Payment received per task E: Benefit of defecting (E = e α) L: Cost of getting caught cheating Cheating detected Cheating undetected α

Basic scheme Registration: –Participant performs d+1 unpaid tasks –The supervisor verifies them (at limited cost) –The participant is accepted iff all the results are correct Assignment of a task: –A task is given to N participants chosen uniformly independently at random –The number N is chosen according to the probability distribution –Payment: a constant amount α per task if all the results agree –If not, the task is re-assigned to a new set of participants Severance: a participant is paid an amount d.α

Properties Computational overhead = ( α +E)P – L(1-P) < 0 Security condition: Computational overhead Setup timeMaximum coalition size Maximum e 10%101%1 17%1010%1 46%101%10 243%101%100 Overhead = for “small” p

Participants with varying computational resources Until now, implicit assumption that all participants have the same computational resources. –Unrealistic assumption –Security threat: an adversary may briefly control a number of participants out of proportions with her real computational power Activity: a probability distribution over the pool of participants, which evolves dynamically over time –Participants are drawn at random according to the Activity –We define rules for updating the activity –Security implications

Variants 1.Another definition of Q: Overhead = 2. Dynamic probability distribution: Security condition: (H+E)P – L(1-P) < 0 Define Q dynamically for each participant

Conclusion We presented a scheme for securing distributed computations based on: –Assignment algorithm –Payment algorithm Much more efficient and secure than current practice Updated version of the paper is available from: Crypto.stanford.edu/~pgolle