TY - GEN
T1 - Secure remote execution of sequential computations
AU - Karame, Ghassan O.
AU - Strasser, Mario
AU - Čapkun, Srdjan
PY - 2009
Y1 - 2009
N2 - We describe a scheme that secures the remote execution of sequential computations in grid-computing scenarios. To the best of our knowledge, this is the first contribution that addresses the security of generic sequential computations. By dividing sequential tasks into smaller subtasks and permuting them among participants, we show that our scheme facilitates the insertion of selective redundancy and/or pre-computed functions (ringers) that are indistinguishable from other computations. We analyze the security of this proposal and we demonstrate that our scheme enables the detection of individual and colluding malicious participants. In addition, we show that our scheme can be equally used to securely track the progress of remote execution. We further investigate the damages introduced by possible chaining of errors within the remote execution and we discuss recovery mechanisms to counter these challenges. We validate our findings both analytically and empirically via simulations.
AB - We describe a scheme that secures the remote execution of sequential computations in grid-computing scenarios. To the best of our knowledge, this is the first contribution that addresses the security of generic sequential computations. By dividing sequential tasks into smaller subtasks and permuting them among participants, we show that our scheme facilitates the insertion of selective redundancy and/or pre-computed functions (ringers) that are indistinguishable from other computations. We analyze the security of this proposal and we demonstrate that our scheme enables the detection of individual and colluding malicious participants. In addition, we show that our scheme can be equally used to securely track the progress of remote execution. We further investigate the damages introduced by possible chaining of errors within the remote execution and we discuss recovery mechanisms to counter these challenges. We validate our findings both analytically and empirically via simulations.
UR - http://www.scopus.com/inward/record.url?scp=76549105820&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-11145-7_15
DO - 10.1007/978-3-642-11145-7_15
M3 - Conference contribution
AN - SCOPUS:76549105820
SN - 3642111440
SN - 9783642111440
VL - 5927 LNCS
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 181
EP - 197
BT - Information and Communications Security - 11th International Conference, ICICS 2009, Proceedings
T2 - 11th International Conference on Information and Communications Security, ICICS 2009
Y2 - 14 December 2009 through 17 December 2009
ER -