The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Pertimbangkan pelanggan yang berhasrat untuk melaksanakan tugas pengkomputeran besar-besaran yang terdiri daripada beberapa sub-tugas, manakala kedua-dua storan dan pengiraan disumber luar oleh pembekal perkhidmatan pihak ketiga. Bagaimanakah pelanggan boleh memastikan integriti dan kesempurnaan hasil pengiraan? Sementara itu, bagaimanakah mekanisme jaminan tidak dikenakan disinsentif, contohnya, kos komunikasi yang berlebihan, untuk mana-mana penyedia perkhidmatan atau pelanggan untuk menyertai skim sedemikian? Kami memperincikan masalah ini dan membentangkan model am jaminan pelaksanaan untuk tugas pengkomputeran besar-besaran. Satu siri ciri utama membezakan kerja kami daripada yang sedia ada: a) kami mempertimbangkan konteks di mana kedua-dua storan dan pengiraan disediakan oleh pihak ketiga yang tidak dipercayai, dan pelanggan tidak mempunyai pemilikan data; b) kami mencadangkan model jaminan yang mudah tetapi berkesan berdasarkan integrasi baru bagi jentera pengesahan data dan pengambilan maklumat peribadi pengiraan (cPIR); c) kami menjalankan kajian analitikal mengenai pertukaran yang wujud antara ketepatan pengesahan, dan kos pengiraan, penyimpanan dan komunikasi.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Salinan
Ting WANG, Ling LIU, "Execution Assurance for Massive Computing Tasks" in IEICE TRANSACTIONS on Information,
vol. E93-D, no. 6, pp. 1343-1351, June 2010, doi: 10.1587/transinf.E93.D.1343.
Abstract: Consider a client who intends to perform a massive computing task comprsing a number of sub-tasks, while both storage and computation are outsourced by a third-party service provider. How could the client ensure the integrity and completeness of the computation result? Meanwhile, how could the assurance mechanism incur no disincentive, e.g., excessive communication cost, for any service provider or client to participate in such a scheme? We detail this problem and present a general model of execution assurance for massive computing tasks. A series of key features distinguish our work from existing ones: a) we consider the context wherein both storage and computation are provided by untrusted third parties, and client has no data possession; b) we propose a simple yet effective assurance model based on a novel integration of the machineries of data authentication and computational private information retrieval (cPIR); c) we conduct an analytical study on the inherent trade-offs among the verification accuracy, and the computation, storage, and communication costs.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.E93.D.1343/_p
Salinan
@ARTICLE{e93-d_6_1343,
author={Ting WANG, Ling LIU, },
journal={IEICE TRANSACTIONS on Information},
title={Execution Assurance for Massive Computing Tasks},
year={2010},
volume={E93-D},
number={6},
pages={1343-1351},
abstract={Consider a client who intends to perform a massive computing task comprsing a number of sub-tasks, while both storage and computation are outsourced by a third-party service provider. How could the client ensure the integrity and completeness of the computation result? Meanwhile, how could the assurance mechanism incur no disincentive, e.g., excessive communication cost, for any service provider or client to participate in such a scheme? We detail this problem and present a general model of execution assurance for massive computing tasks. A series of key features distinguish our work from existing ones: a) we consider the context wherein both storage and computation are provided by untrusted third parties, and client has no data possession; b) we propose a simple yet effective assurance model based on a novel integration of the machineries of data authentication and computational private information retrieval (cPIR); c) we conduct an analytical study on the inherent trade-offs among the verification accuracy, and the computation, storage, and communication costs.},
keywords={},
doi={10.1587/transinf.E93.D.1343},
ISSN={1745-1361},
month={June},}
Salinan
TY - JOUR
TI - Execution Assurance for Massive Computing Tasks
T2 - IEICE TRANSACTIONS on Information
SP - 1343
EP - 1351
AU - Ting WANG
AU - Ling LIU
PY - 2010
DO - 10.1587/transinf.E93.D.1343
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E93-D
IS - 6
JA - IEICE TRANSACTIONS on Information
Y1 - June 2010
AB - Consider a client who intends to perform a massive computing task comprsing a number of sub-tasks, while both storage and computation are outsourced by a third-party service provider. How could the client ensure the integrity and completeness of the computation result? Meanwhile, how could the assurance mechanism incur no disincentive, e.g., excessive communication cost, for any service provider or client to participate in such a scheme? We detail this problem and present a general model of execution assurance for massive computing tasks. A series of key features distinguish our work from existing ones: a) we consider the context wherein both storage and computation are provided by untrusted third parties, and client has no data possession; b) we propose a simple yet effective assurance model based on a novel integration of the machineries of data authentication and computational private information retrieval (cPIR); c) we conduct an analytical study on the inherent trade-offs among the verification accuracy, and the computation, storage, and communication costs.
ER -