On Verifying the Consistency of Remote Untrusted Services
نویسندگان
چکیده
A group of mutually trusting clients outsources a computation service to a remote server, which they do not fully trust and that may be subject to attacks. The clients do not communicate with each other and would like to verify the correctness of the remote computation and the consistency of the server’s responses. This paper presents the Commutative-Operation verification Protocol (COP) that ensures linearizability when the server is correct and preserves fork-linearizability in any other case. Fork-linearizability ensures that all clients that observe each other’s operations are consistent in the sense that their own operations and those operations of other clients that they see are linearizable. COP goes beyond previous protocols in supporting wait-free client operations for sequences of commutative operations.
منابع مشابه
Verifying the Consistency of Remote Untrusted Services with Commutative Operations
A group of mutually trusting clients outsources a computation service to a remote server, which they do not fully trust and that may be subject to attacks. The clients do not communicate with each other and would like to verify the correctness of the remote computation and the consistency of the server’s responses. This paper presents the Commutative-Operation verification Protocol (COP) that e...
متن کاملIntegrity and Consistency for Untrusted Services
A group of mutually trusting clients outsources an arbitrary computation service to a remote provider, which they do not fully trust and that may be subject to attacks. The clients do not communicate with each other and would like to verify the integrity of the stored data, the correctness of the remote computation process, and the consistency of the provider’s responses. We present a novel pro...
متن کاملRemote Integrity Checking - How to Trust Files Stored on Untrusted Servers
This paper analyzes the problem of checking the integrity of files stored on remote servers. Since servers are prone to successful attacks by malicious hackers, the result of simple integrity checks run on the servers cannot be trusted. Conversely, downloading the files from the server to the verifying host is impractical. Two solutions are proposed, based on challenge-response
متن کاملRemote Hospital Reform in the Context of Australian Health Care Reforms
Public hospitals play an important role in the delivery of essential healthcare in Australia as in many countries. The Australian Government has in the recent years implemented national healthcare reform to improve the performance of and access to public hospital services. This reform extends to all public hospitals including remote hospitals. However, there is limited information on how reform...
متن کاملData consistency and coordination for untrusted environments
Users of today’s computing devices are accustomed to having a permanent and capable connection to the Internet. Personal data and computational tasks are increasingly assigned to online services. Besides many advantages, online services may not be fully trusted by the users as they are usually hosted by a third party provider. Cryptographic techniques are able to prevent a provider from leaking...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1302.4808 شماره
صفحات -
تاریخ انتشار 2013