Game-Theoretic Framework for Integrity Veri cation in Computation Outsourcing
نویسندگان
چکیده
In the cloud computing era, in order to avoid computational burdens, many organizations tend to outsource their computations to third-party cloud servers. In order to protect service quality, the integrity of computation results need to be guaranteed. In this paper, we develop a game theoretic framework which helps the outsourcer to minimize its cost while ensuring the integrity of the outsourced computation. We then apply the proposed framework to two collaborative filtering algorithms and demonstrate the equilibriums together with the corresponding minimal costs. Finally, we show that, by including the intermediate results in the final output, further cost reduction can be achieved.
منابع مشابه
Outsourcing through Three-dimensional Competition
In this paper, we study an outsourced supply chain consisting of one buyer and two suppliers in which the buyer outsources manufacturing of a physical product to two competing suppliers. The suppliers compete for the buyers' demands share, and the buyer allocates the demands to the competing suppliers based on three-dimensional allocation functions. We consider two certain types of allocation f...
متن کاملThe epistemic representation of information flow security in probabilistic systems
We set out a logic for reasoning about multilevel security of probabilistic systems. This logic includes modalities for time, knowledge, and probability. In earlier work we gave syntactic de nitions of multilevel security and showed that their semantic interpretations are equivalent to independently motivated information-theoretic de nitions. This paper builds on that earlier work in two ways. ...
متن کاملByte Code Verification for Java Smart Card Based on Model Checking
The paper presents a novel approach to Java byte code veri cation: The veri cation process is performed \o ine" on a network server, instead of incorporating it in the client. Furthermore, the most critical part of the veri cation process is based upon a formal model and uses a model checker for checking the veri cation conditions. The result of the veri cation process can be securely communica...
متن کاملEfficient Query Verification on Outsourced Data: A Game-Theoretic Approach
To save time and money, businesses and individuals have begun outsourcing their data and computations to cloud computing services. These entities would, however, like to ensure that the queries they request from the cloud services are being computed correctly. In this paper, we use the principles of economics and competition to vastly reduce the complexity of query verification on outsourced da...
متن کاملEfficient Computation of Semivalues for Game-Theoretic Network Centrality
Solution concepts from cooperative game theory, such as the Shapley value or the Banzhaf index, have recently been advocated as interesting extensions of standard measures of node centrality in networks. While this direction of research is promising, the computation of game-theoretic centrality can be challenging. In an attempt to address the computational issues of game-theoretic network centr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2016 شماره
صفحات -
تاریخ انتشار 2016