Outsourced Computation Verification

Slides:



Advertisements
Similar presentations
Xiaoming Sun Tsinghua University David Woodruff MIT
Advertisements

Multi-Party Contract Signing Sam Hasinoff April 9, 2001.
Quantum Information and the PCP Theorem Ran Raz Weizmann Institute.
Probabilistic Skyline Operator over Sliding Windows Wenjie Zhang University of New South Wales & NICTA, Australia Joint work: Xuemin Lin, Ying Zhang, Wei.
ABSTRACT We consider the problem of computing information theoretic functions such as entropy on a data stream, using sublinear space. Our first result.
How to Delegate Computations: The Power of No-Signaling Proofs Ron Rothblum Weizmann Institute Joint work with Yael Kalai and Ran Raz.
Chapter 9: Searching, Sorting, and Algorithm Analysis
Helper Protocols Protocols that either make it easier for IP to do its job, or extend the capabilities of the network layer.
Routing Basics By Craig Lindstrom. Overview Routing Process Routing Process Default Routing Default Routing Static Routing Static Routing Dynamic Routing.
Samsara: Honor Among Thieves in Peer-to-Peer Storage Landon P. Cox and Brian D. Noble University of Michigan.
PCPs and Inapproximability Introduction. My T. Thai 2 Why Approximation Algorithms  Problems that we cannot find an optimal solution.
Complexity 26-1 Complexity Andrei Bulatov Interactive Proofs.
Complexity 18-1 Complexity Andrei Bulatov Probabilistic Algorithms.
EEC-484/584 Computer Networks Lecture 6 Wenbing Zhao
Space-Efficient Algorithms for Streaming Data Matthew Todd Adereth Yuval Ishai & Mahesh Viswanathan.
What ’ s Hot and What ’ s Not: Tracking Most Frequent Items Dynamically G. Cormode and S. Muthukrishman Rutgers University ACM Principles of Database Systems.
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
Optimistic Synchronous Multi-Party Contract Signing N. Asokan, Baum-Waidner, M. Schunter, M. Waidner Presented By Uday Nayak Advisor: Chris Lynch.
DNS: Revising the Current Protocol Matt Gustafson Matt Weaver CS522 Computer Communications University of Colorado, Colorado Springs.
Ch. 31 Q and A IS 333 Spring 2015 Victor Norman. SNMP, MIBs, and ASN.1 SNMP defines the protocol used to send requests and get responses. MIBs are like.
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
IP Forwarding.
RESOURCES, TRADE-OFFS, AND LIMITATIONS Group 5 8/27/2014.
UNIT -1. DATA COMMUNICATIONS The term telecommunication means communication at a distance. The word data refers to information presented in whatever form.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Introduction to Problem Solving. Steps in Programming A Very Simplified Picture –Problem Definition & Analysis – High Level Strategy for a solution –Arriving.
Data Stream Algorithms Ke Yi Hong Kong University of Science and Technology.
NFD Tunnel Authentication Junxiao Shi,
Interactive proof systems Section 10.4 Giorgi Japaridze Theory of Computability.
Presented by Rebecca Meinhold But How Does the Internet Work?
Network Protocols Network Systems Security Mort Anvari.
The Misra Gries Algorithm. Motivation Espionage The rest we monitor.
Data Stream Algorithms Lower Bounds Graham Cormode
At what level do I trust the outcomes of the model? Verification Calibration Validation Exploration of the model structure. the activity of adjusting the.
Slide 1© ECMWF CONSTRAINTS TO INCREASED WEATHER RADAR DATA EXCHANGE Understanding the technical Information Systems constraints (R Giraud, ECMWF and Secretariat)
Lower bounds on data stream computations Seminar in Communication Complexity By Michael Umansky Instructor: Ronitt Rubinfeld.
Questions 4) What type of algorithmic problem-solving technique (greedy, divide-and-conquer, dynamic programming)
Pythagorean Theorem G.5.1: Prove and use the Pythagorean Theorem. Lauren Smith 9 th Grade Algebra I.
Continuous Monitoring of Distributed Data Streams over a Time-based Sliding Window MADALGO – Center for Massive Data Algorithmics, a Center of the Danish.
Introduction toData structures and Algorithms
Internet Control Message Protocol (ICMP)
Introduction to Search Algorithms
TCC 2016-B Composable Security in the Tamper-Proof Hardware Model under Minimal Complexity Carmit Hazay Bar-Ilan University, Israel Antigoni Ourania.
Open Problems in Streaming
Aaron Gember-Jacobson
Verification of Outsourced Data Analysis
Outsourced Computation Verification
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Computational Complexity
Lecture 6 Efficiency of Algorithms (2) (S&G, ch.3)
Let {image} Use substitution to determine which elements of S satisfy the inequality {image} Select the correct answer(s): {image}
Discrete Mathematics CMP-101 Lecture 12 Sorting, Bubble Sort, Insertion Sort, Greedy Algorithms Abdul Hameed
Exercise Find quality estimates for round 3 (Estonia) items B37, B38 and B39. If observed correlations between B37 and B38 is .439; B37 and B39 is .441;
Part of Chapter 1 Key Concepts Networks
Introduction to Stream Computing and Reservoir Sampling
SENSATIONAL SEVENS PART 1
Solve the equation: 6 x - 2 = 7 x + 7 Select the correct answer.
Heavy Hitters in Streams and Sliding Windows
By: Ran Ben Basat, Technion, Israel
Network Performance Definitions
COMPUTER NETWORKS PRESENTATION
What is 13 ÷ 4.
SENSATIONAL SEVENS PART 2
Chemistry Lab Reports.
Discrete Mathematics and Its Applications
Ensuring Correctness over Untrusted Private Database
Completing the Square pages 544–546 Exercises , – , –2
Presentation transcript:

Outsourced Computation Verification Roy Luo, UC Berkeley Under the mentorship of Graham Cormode, AT&T Labs DIMACS REU 2010

The Background Streaming Model Large amounts of data, limited memory E.g. Router observing network traffic Answer questions about data after only one pass E.g. what was the kth element? Most frequent element? One solution: outsource problem to a 3rd party with more computing power (cloud computing)

The Model You(verifier) and a 3rd party (helper) Both agents process entire data stream After seeing all the data, helper responds to verifier with answer to query Data Stream “Answer” V H

The Problem If we fully trust 3rd party, we’re done But: helper may have made an error or may be outright deceptive Require helper to prove correctness Need a “proof” that can be verified in limited space One-round model: H sends V one message containing the answer and a proof Multi-round model: H and V exchange messages until V is satisfied that H gave the right answer

An Example The INDEX problem: Without a helper, takes (N) space for N items (even probabilistically) Using one-round protocol, INDEX has solution with HV = O(Nlog(N)), H = length of helper’s message, V = space used by verifier E.g. H = O(√N), V = O(√N*log(N)) Using multi-round protocol, INDEX has a solution that uses V = O(log(N)) and H = O(log(N))

Directions for Research Are existing protocols practical for real-world use? What other problems require protocols? What class of problems can be solved in this model?