Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing

被引:124
作者
Dong, Changyu [1 ]
Wang, Yilei [1 ]
Aldweesh, Amjad [1 ]
McCorry, Patrick [2 ]
van Moorsel, Aad [1 ]
机构
[1] Newcastle Univ, Newcastle Upon Tyne, Tyne & Wear, England
[2] UCL, London, England
来源
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2017年
基金
英国工程与自然科学研究理事会;
关键词
Verifiable Computing; Smart Contract; Game Theory; Collusion; Trust;
D O I
10.1145/3133956.3134032
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has become an irreversible trend. Together comes the pressing need for verifiability, to assure the client the correctness of computation outsourced to the cloud. Existing verifiable computation techniques all have a high overhead, thus if being deployed in the clouds, would render cloud computing more expensive than the on-premises counterpart. To achieve verifiability at a reasonable cost, we leverage game theory and propose a smart contract based solution. In a nutshell, a client lets two clouds compute the same task, and uses smart contracts to stimulate tension, betrayal and distrust between the clouds, so that rational clouds will not collude and cheat. In the absence of collusion, verification of correctness can be done easily by crosschecking the results from the two clouds. We provide a formal analysis of the games induced by the contracts, and prove that the contracts will be effective under certain reasonable assumptions. By resorting to game theory and smart contracts, we are able to avoid heavy cryptographic protocols. The client only needs to pay two clouds to compute in the clear, and a small transaction fee to use the smart contracts. We also conducted a feasibility study that involves implementing the contracts in Solidity and running them on the official Ethereum network.
引用
收藏
页码:211 / 227
页数:17
相关论文
共 53 条
  • [1] VD-PSI: Verifiable Delegated Private Set Intersection on Outsourced Private Datasets
    Abadi, Aydin
    Terzis, Sotirios
    Dong, Changyu
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2017, 9603 : 149 - 168
  • [2] Alsberg P. A., 1976, 2nd International Conference on Software Engineering, P562
  • [3] Secure Multiparty Computations on Bitcoin
    Andrychowicz, Marcin
    Dziembowski, Stefan
    Malinowski, Daniel
    Mazurek, Lukasz
    [J]. 2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 443 - 458
  • [4] [Anonymous], ABS170801171 CORR
  • [5] [Anonymous], SOL DOC
  • [6] [Anonymous], ETH WIK GETH
  • [7] [Anonymous], ACM CCS 2011
  • [8] [Anonymous], 2016, P 2016 ACMCONFERENCE
  • [9] [Anonymous], FOCS 2013
  • [10] [Anonymous], 4 WORKSH BITC BLOCKC