Verifying the Consistency of Remote Untrusted Services with Commutative Operations
نویسندگان
چکیده
A group of mutually trusting clients outsources a computation service to a remote server, which they do not fully trust and that may be subject to attacks. The clients do not communicate with each other and would like to verify the correctness of the remote computation and the consistency of the server’s responses. This paper presents the Commutative-Operation verification Protocol (COP) that ensures linearizability when the server is correct and preserves fork-linearizability in any other case. Fork-linearizability ensures that all clients that observe each other’s operations are consistent in the sense that their own operations and those operations of other clients that they see are linearizable. COP strictly generalizes previous protocols by modeling abortable services and by supporting waitfree client operations for sequences of arbitrary commutative operations. When combined with authenticated data structures, COP also adds distributed consistency verification to computations with outsourced state, where the clients do not store the whole state of the computation.
منابع مشابه
On Verifying the Consistency of Remote Untrusted Services
A group of mutually trusting clients outsources a computation service to a remote server, which they do not fully trust and that may be subject to attacks. The clients do not communicate with each other and would like to verify the correctness of the remote computation and the consistency of the server’s responses. This paper presents the Commutative-Operation verification Protocol (COP) that e...
متن کاملIntegrity and Consistency for Untrusted Services
A group of mutually trusting clients outsources an arbitrary computation service to a remote provider, which they do not fully trust and that may be subject to attacks. The clients do not communicate with each other and would like to verify the integrity of the stored data, the correctness of the remote computation process, and the consistency of the provider’s responses. We present a novel pro...
متن کاملData consistency and coordination for untrusted environments
Users of today’s computing devices are accustomed to having a permanent and capable connection to the Internet. Personal data and computational tasks are increasingly assigned to online services. Besides many advantages, online services may not be fully trusted by the users as they are usually hosted by a third party provider. Cryptographic techniques are able to prevent a provider from leaking...
متن کاملIncorrect Lower Bounds for Path Consistency and More
In this paper, we present an efficient algorithm for verifying path-consistency on a binary constraint network. The complexities of our algorithm beat the previous conjectures on the lower bounds for verifying path-consistency. We therefore defeat the proofs for several published results that incorrectly rely on these conjectures. Our algorithm is motivated by the idea of reformulating path-con...
متن کاملRemote Integrity Checking - How to Trust Files Stored on Untrusted Servers
This paper analyzes the problem of checking the integrity of files stored on remote servers. Since servers are prone to successful attacks by malicious hackers, the result of simple integrity checks run on the servers cannot be trusted. Conversely, downloading the files from the server to the verifying host is impractical. Two solutions are proposed, based on challenge-response
متن کامل