Using a Network of Untrusted Computers for Secure Computing

被引:0
作者
Maly, Michal [1 ]
机构
[1] Comenius Univ, Fac Math Phys & Informat, Dept Appl Informat, Bratislava, Slovakia
来源
PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON AUTONOMIC AND AUTONOMOUS SYSTEMS (ICAS 2011) | 2011年
关键词
cloud computing; security; distributed computing; COMPUTATION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper defines a new problem in distributed computing: How to securely compute one's own problem using a network of untrusted computers? A theoretic solution of the problem is also presented. All secret input data and a secret result are known only by the initiator of the computation. Other computers are used only to carry out the computation using their computer time and memory. The communication can be eavesdropped, and any of untrusted computers can arbitrarily tamper the computation, assuming that no cooperation between untrusted computers occurs. This problem is different from a well-known multiparty distributed computation problem. Here, only one party has all the secret data. The computation is carried out on untrusted computers. An untrusted computer has access to only a small part of secret. Provided no or only a few untrusted computers are cooperating, the secret input data, and the result of the computation is not revealed.
引用
收藏
页码:57 / 61
页数:5
相关论文
共 10 条
  • [1] Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
  • [2] Gerard S.N., 2010, US Patent, Patent No. [7,661,137, 7661137]
  • [3] Goldschlag D. M., 1996, Information Hiding. First International Workshop Proceedings, P137
  • [4] Jarecki S, 2007, LECT NOTES COMPUT SC, V4515, P97
  • [5] Lindell Y, 2007, LECT NOTES COMPUT SC, V4515, P52
  • [6] Mersenne Research Inc, GREAT INT MERS PRIM, Vonline
  • [7] Nielsen JB, 2009, LECT NOTES COMPUT SC, V5444, P368
  • [8] Sander T., 1998, Mobile agents and security, P44
  • [9] Sabotage-tolerance mechanisms for volunteer computing systems
    Sarmenta, LFG
    [J]. FUTURE GENERATION COMPUTER SYSTEMS, 2002, 18 (04) : 561 - 572
  • [10] Yao A, 1982, IEEE S FOCS, V23, P160, DOI DOI 10.1109/SFCS.1982.88