COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Computer Laboratory Security Seminar > Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud ComputingAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Alexander Vetterl. Cloud computing has become an irreversible trend. There is a pressing need for verifiability: the cloud providers are external parties whose interests may not fully align with those of its clients, therefore they cannot be fully trusted. To exercise due diligence and gain greater confidence in computation outsourced to the cloud, clients need to be able to verify the correctness of the results returned. However, existing verifiable computation techniques all have a high overhead, thus if being deployed in the clouds, would render cloud computing more expensive than the on-premises counterpart, and would diminish the motivation for using the clouds. In this talk, I will present our recent attempt to achieve verifiability at a reasonable cost, by leveraging game theory and smart contracts, which is a newly developed paradigm on top of the blockchain technology. In a nutshell, a client lets two clouds compute the same task, and uses smart contracts to stimulate tension, betrayal and distrust between the clouds, so that rational clouds will not collude and cheat. In the absence of collusion, verification of correctness can be done easily by crosschecking the results from the two clouds. We provide a formal analysis of the games induced by the contracts, and prove that the contracts will be effective under certain reasonable assumptions. By resorting to game theory and smart contracts, we are able to avoid heavy cryptographic protocols. The client only needs to pay two clouds to compute in the clear, and a small transaction fee to use the smart contracts. We also conducted a feasibility study that involves implementing the contracts in Solidity and running them on the official Ethereum network. The talk is based on a recent paper in CCS 2017 , the full version of the paper can be accessed through https://arxiv.org/abs/1708.01171. This talk is part of the Computer Laboratory Security Seminar series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsCentre of Latin American Studies - lectures Short Course: Higher order regularisation in imaging Faraday InstituteOther talksA physical model for wheezing in lungs How to rediscover a medical secret in eighteenth-century France: the lost recipe of the Chevalier de Guiller's powder febrifuge EMERGING EPIGENETICS: DETECTING & MODIFYING EPIGENETICS MARKS Barnum, Bache and Poe: the forging of science in the Antebellum US Loss and damage: Insights from the front lines in Bangladesh |