Program Analyses for Cloud Computations

作者: Sai Deep Tetali

DOI:

关键词:

摘要: Cloud computing has become an essential part of our infrastructure. In this model, data and programs are hosted in (often third-party) centers that provide APIs for access running large-scale computations. It is used almost all major internet services companies increasingly being considered by other organizations to host their run analytics. However several challenges lie its full-scale adoption, chief among them security, performance correctness. Security important as both client computations need be sent third-party centers. Performance cloud involves development iterations, each on data. Correctness critical frameworks complex distributed systems serving billions users every day.In dissertation, I argue program analysis techniques can help address the above key computing. describe three projects illustrate different aspects solution space: MrCrypt a system uses static guarantee confidentiality using homomorphic encryption schemes. Vega library significantly improves incremental rewriting modified workflows use previously computed results. Kuai distributed, enumerative model checker verifies correctness Software Defined Networks, networking layer many

参考文章(73)
Shafi Goldwasser, Raluca Ada Popa, Raphael Bost, Stephen Tu, Machine Learning Classification over Encrypted Data. IACR Cryptology ePrint Archive. ,vol. 2014, pp. 331- ,(2014)
Frank McSherry, Michael Isard, Rebecca Isaacs, Derek Murray, Differential dataflow ,(2013)
Craig Gentry, Shai Halevi, Implementing Gentry's fully-homomorphic encryption scheme international cryptology conference. pp. 129- 148 ,(2011) , 10.1007/978-3-642-20465-4_9
Mithuna Thottethodi, Faraz Ahmad, Seyong Lee, T. N. Vijaykumar, PUMA: Purdue MapReduce Benchmarks Suite ,(2012)
Jennifer Widom, Hyunjung Park, Robert Ikeda, Provenance for Generalized Map and Reduce Workflows conference on innovative data systems research. pp. 273- 283 ,(2011)
Vitaly Shmatikov, Ann Kilzer, Srinath T. V. Setty, Indrajit Roy, Emmett Witchel, Airavat: security and privacy for MapReduce networked systems design and implementation. pp. 20- 20 ,(2010) , 10.5555/1855711.1855731
J. Manyika, Michael Chui, Brad Brown, Jacques Bughin, Richard Dobbs, Charles Roxburgh, Angela Hung Byers, Big data: The next frontier for innovation, competition, and productivity ,(2011)
Bruce Schneier, Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) fast software encryption. pp. 191- 204 ,(1993) , 10.1007/3-540-58108-1_24
Jens Palsberg, Peter Ørbæk, Trust in the-calculus ,(1995)