Proceedings of the Institute for System Programming of the RAS
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Proceedings of ISP RAS:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Proceedings of the Institute for System Programming of the RAS, 2020, Volume 32, Issue 4, Pages 115–132
DOI: https://doi.org/10.15514/ISPRAS-2020-32(4)-8
(Mi tisp528)
 

Protocol for certifying cloud computations integrity

E. S. Shishkina, E. S. Kislitsynba

a InfoTeCS, Advanced Research Department
b Lomonosov Moscow State University
References:
Abstract: We define a problem of certifying computation integrity performed by some remote party we do not necessarily trust. We present a multi-party interactive protocol that solves this problem under specified constraints. The protocol rely on a computing entity called weak reliable computing device that is able to produce certificate for a tiny computation. A complex computation of a user can be certified by relying on such weak entity if we translate the user program into an iterative form that converges to the result, a style resembling continuation-passing style programming paradigm. Each iteration of the computation can then be certified by the weak reliable computing device. To ensure the user that computation result was computed fairly and correctly, we put this mechanism into a multi-party incentivized context of several computing providers competing with each other for publishing the result and taking the reward, or finding an error in the published result of other parties. Together with computation result, the computation certificate is published. The certificate is constructed in such a way that other fair parties (auditors) are able to find divergent computation step in $O(\log n)$ steps, where $n$ is a number of computing steps taken before reaching the result. If error is found, the auditor sends proof of the error (called refutation) in the trusted weak computing device that plays the role of autonomous transparent arbiter able to check refutation by replaying a tiny fraction of the computation. Comparing to the nearest related work, our protocol reduces a proof construction complexity from $O(n\log n)$ to $O(n)$, turning a communication complexity to exactly one round using a certificate of a comparable length. We also give the formal specification for the protocol and prove some of its security properties in a specified threat-model. Experimental evaluation of the protocol in a model setting is provided.
Keywords: computation integrity, interactive proofs, computation certificates.
Document Type: Article
Language: Russian
Citation: E. S. Shishkin, E. S. Kislitsyn, “Protocol for certifying cloud computations integrity”, Proceedings of ISP RAS, 32:4 (2020), 115–132
Citation in format AMSBIB
\Bibitem{ShiKis20}
\by E.~S.~Shishkin, E.~S.~Kislitsyn
\paper Protocol for certifying cloud computations integrity
\jour Proceedings of ISP RAS
\yr 2020
\vol 32
\issue 4
\pages 115--132
\mathnet{http://mi.mathnet.ru/tisp528}
\crossref{https://doi.org/10.15514/ISPRAS-2020-32(4)-8}
Linking options:
  • https://www.mathnet.ru/eng/tisp528
  • https://www.mathnet.ru/eng/tisp/v32/i4/p115
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Proceedings of the Institute for System Programming of the RAS
    Statistics & downloads:
    Abstract page:55
    Full-text PDF :51
    References:13
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024