Verifying the Consistency of Remote Untrusted Services with Commutative Operations

作者: Christian Cachin , Olga Ohrimenko

DOI: 10.1007/978-3-319-14472-6_1

关键词: Service (systems architecture)Commutative propertyProtocol (object-oriented programming)Data integrityConsistency (database systems)Computer scienceOperating systemCorrectnessCloud computingLinearizability

摘要: A group of mutually trusting clients outsources a computation service to remote server, which they do not fully trust and that may be subject attacks. The communicate with each other would like verify the correctness consistency server’s responses. This paper first presents Commutative-Operation verification Protocol (COP) ensures linearizability when server is correct preserves fork-linearizability in any case. All observe other’s operations are consistent, sense their own those see linearizable. Second, this work extends COP through authenticated data structures Authenticated , allows outsourced services whose state kept only remotely, by server. yields fork-linearizable protocol for generic (1) relieves from storing state, (2) supports wait-free client operations, (3) handles sequences arbitrary commutative operations.

参考文章(34)
Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova, Quadratic Span Programs and Succinct NIZKs without PCPs theory and application of cryptographic techniques. pp. 626- 645 ,(2013) , 10.1007/978-3-642-38348-9_37
Edward W. Felten, Michael J. Freedman, Ariel J. Feldman, William P. Zeller, SPORC: group collaboration using untrusted cloud resources operating systems design and implementation. pp. 337- 350 ,(2010) , 10.5555/1924943.1924967
Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos, Optimal verification of operations on dynamic sets international cryptology conference. ,vol. 2010, pp. 91- 110 ,(2011) , 10.1007/978-3-642-22792-9_6
Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, Nikos Triandopoulos, Verifiable Set Operations over Outsourced Databases public key cryptography. pp. 113- 130 ,(2014) , 10.1007/978-3-642-54631-0_7
Christian Cachin, None, Integrity and Consistency for Untrusted Services SOFSEM 2011: Theory and Practice of Computer Science. ,vol. 6543, pp. 1- 14 ,(2011) , 10.1007/978-3-642-18381-2_1
David Maziéres, Jinyuan Li, Beyond one-third faulty replicas in byzantine fault tolerant systems networked systems design and implementation. pp. 10- 10 ,(2007)
Matthias Majuntke, Dan Dobre, Marco Serafini, Neeraj Suri, Abortable Fork-Linearizable Storage international conference on principles of distributed systems. pp. 255- 269 ,(2009) , 10.1007/978-3-642-10877-8_21
Roberto Tamassia, Authenticated Data Structures european symposium on algorithms. pp. 2- 5 ,(2003) , 10.1007/978-3-540-39658-1_2
Christian Cachin, Rachid Guerraoui, Luís Rodrigues, None, Introduction to Reliable and Secure Distributed Programming ,(2011)
Nikos Triandopoulos, Ahmed E. Kosba, Charalampos Papamanthou, Dimitrios Papadopoulos, Elaine Shi, Mahmoud F. Sayed, TRUESET: faster verifiable set computations usenix security symposium. pp. 765- 780 ,(2014)