Secure Distributed Human Computation

ثبت نشده
چکیده

This paper introduces a line of research on secure distributed human computation. We consider the general paradigm of using large-scale distributed computation to solve difficult problems, but where humans can act as agents and provide candidate solutions. We are especially motivated by problem classes that appear to be difficult for computers to solve effectively, but are easier for humans to solve; for example, image analysis, speech recognition, and natural language processing. This paradigm already seems to be employed in a number of real-world scenarios, but we are unaware of any attempt to formally study it. Nonetheless, this concept spawns interesting research questions in cryptography, algorithm design, human computer interfaces, and programming language / API design, among other fields. Furthermore, there are interesting implications for internet commerce and the B24b model. In this paper, we introduce this area of research and put forth a basic framework and architecture for the secure design of such systems. We analyze security and reliability against malicious parties using standard tools from probability theory. We then derive design principles using standard game-theoretic concepts. Finally, we list various extensions and open problems. “Now we have in our hands a method for going beyond the computed, leapfrogging it, passing through it. We will combine the mechanics of computation with human thought; we will have the equivalent of intelligent computers, billions of them. I can’t predict what the consequences will be in detail, but they will be incalculable.” Congressman Brant, from Isaac Asimov’s Feeling of Power ; taken from [3].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Separating indexes from data: a distributed scheme for secure database outsourcing

Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...

متن کامل

A Diierent Look at Secure Distributed Computation

We discuss various aspects of secure distributed computation and look at weakening both the goals of such computation and the assumed capabilities of adversaries. We present a new protocol for a conditional form of probabilistic coordination and present a model of secure distributed computation in which friendly and hostile nodes are represented in competing interwoven networks of nodes. It is ...

متن کامل

Secure Distributed Computation of the Square Root and Applications

The square root is an important mathematical primitive whose secure, efficient, distributed computation has so far not been possible. We present a solution to this problem based on Goldschmidt’s algorithm. The starting point is computed by linear approximation of the normalized input using carefully chosen coefficients. The whole algorithm is presented in the fixed-point arithmetic framework of...

متن کامل

Robust Operations

Operations under malicious attack are usually studied in a very narrow context. The typical example is in the context of point-to-point communication networks in a graph. The question is whether after k nodes have been destroyed, each remaining node can continue communicating to any remaining one. The topic was generalized to (1) secure distributed computation (secure multiparty computation); (...

متن کامل

Secure Multiparty Computation 4.1.1 Overview of Dining Cryptographers (dc) Problem . . . . . . . . . . . 41 List of Figures

Ray Kresman, Advisor Data mining algorithms help reveal hidden information in a repository. Distributed mining algorithms meet this need by distributing data and computation. One of the most important issues of these algorithms is how to safely mine the data. Secure Multiparty Computation (SMC), a framework for safe mining of distributed data, provides some security promises of the computation....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004