Secure remote execution of sequential computations

Ghassan O. Karame, Mario Strasser, Srdjan Čapkun

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Abstract

    We describe a scheme that secures the remote execution of sequential computations in grid-computing scenarios. To the best of our knowledge, this is the first contribution that addresses the security of generic sequential computations. By dividing sequential tasks into smaller subtasks and permuting them among participants, we show that our scheme facilitates the insertion of selective redundancy and/or pre-computed functions (ringers) that are indistinguishable from other computations. We analyze the security of this proposal and we demonstrate that our scheme enables the detection of individual and colluding malicious participants. In addition, we show that our scheme can be equally used to securely track the progress of remote execution. We further investigate the damages introduced by possible chaining of errors within the remote execution and we discuss recovery mechanisms to counter these challenges. We validate our findings both analytically and empirically via simulations.

    Original languageEnglish
    Title of host publicationInformation and Communications Security - 11th International Conference, ICICS 2009, Proceedings
    Pages181-197
    Number of pages17
    Volume5927 LNCS
    DOIs
    Publication statusPublished - 2009
    Event11th International Conference on Information and Communications Security, ICICS 2009 - Beijing, China
    Duration: 14 Dec 200917 Dec 2009

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume5927 LNCS
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Other

    Other11th International Conference on Information and Communications Security, ICICS 2009
    Country/TerritoryChina
    CityBeijing
    Period14/12/0917/12/09

    Fingerprint

    Dive into the research topics of 'Secure remote execution of sequential computations'. Together they form a unique fingerprint.

    Cite this