首页 > 最新文献

Proceedings of the 9th Workshop on Hot Topics in Dependable Systems最新文献

英文 中文
Towards transparent hardening of distributed systems 走向分布式系统的透明强化
Pub Date : 2013-11-03 DOI: 10.1145/2524224.2524230
Diogo Behrens, C. Fetzer, F. Junqueira, M. Serafini
In distributed systems, errors such as data corruption or arbitrary changes to the flow of programs might cause processes to propagate incorrect state across the system. To prevent error propagation in such systems, an efficient and effective technique is to harden processes against Arbitrary State Corruption (ASC) faults through local detection, without replication. For distributed systems designed from scratch, dealing with state corruption can be made fully transparent, but requires that developers follow a few concrete design patterns. In this paper, we discuss the problem of hardening existing code bases of distributed systems transparently. Existing systems have not been designed with ASC hardening in mind, so they do not necessarily follow required design patterns. For such systems, we focus here on both performance and number of changes to the existing code base. Using memcached as an example, we identify and discuss three areas of improvement: reducing the memory overhead, improving access to state variables, and supporting multi-threading. Our initial evaluation of memcached shows that our ASC-hardened version obtains a throughput that is roughly 76% of the throughput of stock memcached with 128-byte and 1k-byte messages.
在分布式系统中,诸如数据损坏或程序流的任意更改之类的错误可能会导致进程在整个系统中传播错误的状态。为了防止此类系统中的错误传播,一种高效而有效的技术是通过本地检测来强化过程,防止任意状态腐败(ASC)故障,而不进行复制。对于从头开始设计的分布式系统,处理状态腐败可以完全透明,但要求开发人员遵循一些具体的设计模式。本文讨论了分布式系统现有代码库的透明加固问题。现有的系统在设计时没有考虑到ASC加固,因此它们不一定遵循所需的设计模式。对于这样的系统,我们在这里主要关注性能和对现有代码库的更改数量。以memcached为例,我们确定并讨论了三个改进领域:减少内存开销、改进对状态变量的访问以及支持多线程。我们对memcached的初步评估表明,我们的asc强化版本获得的吞吐量大约是128字节和1k字节消息的常规memcached吞吐量的76%。
{"title":"Towards transparent hardening of distributed systems","authors":"Diogo Behrens, C. Fetzer, F. Junqueira, M. Serafini","doi":"10.1145/2524224.2524230","DOIUrl":"https://doi.org/10.1145/2524224.2524230","url":null,"abstract":"In distributed systems, errors such as data corruption or arbitrary changes to the flow of programs might cause processes to propagate incorrect state across the system. To prevent error propagation in such systems, an efficient and effective technique is to harden processes against Arbitrary State Corruption (ASC) faults through local detection, without replication. For distributed systems designed from scratch, dealing with state corruption can be made fully transparent, but requires that developers follow a few concrete design patterns. In this paper, we discuss the problem of hardening existing code bases of distributed systems transparently. Existing systems have not been designed with ASC hardening in mind, so they do not necessarily follow required design patterns. For such systems, we focus here on both performance and number of changes to the existing code base. Using memcached as an example, we identify and discuss three areas of improvement: reducing the memory overhead, improving access to state variables, and supporting multi-threading. Our initial evaluation of memcached shows that our ASC-hardened version obtains a throughput that is roughly 76% of the throughput of stock memcached with 128-byte and 1k-byte messages.","PeriodicalId":436314,"journal":{"name":"Proceedings of the 9th Workshop on Hot Topics in Dependable Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114776875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Using big data for more dependability: a cellular network tale 利用大数据提高可靠性:蜂窝网络的故事
Pub Date : 2013-11-03 DOI: 10.1145/2524224.2524227
Nawanol Theera-Ampornpunt, S. Bagchi, Kaustubh R. Joshi, R. Panta
There are many large infrastructures that instrument everything from network performance metrics to user activities. However, the collected data are generally used for long-term planning instead of improving reliability and user experience in real time. In this paper, we present our vision of how such collections of data can be used in real time to enhance the dependability of cellular network services. We first discuss mitigation mechanisms that can be used to improve reliability, but incur a high cost which prohibit them to be used except in certain conditions. We present two case studies where analyses of real cellular network traffic data show that we can identify these conditions.
有许多大型基础设施可以检测从网络性能指标到用户活动的所有内容。然而,收集到的数据通常用于长期规划,而不是实时提高可靠性和用户体验。在本文中,我们提出了如何实时使用这些数据集来增强蜂窝网络服务的可靠性的设想。我们首先讨论可用于提高可靠性的缓解机制,但会产生高成本,因此除非在某些条件下,否则无法使用这些机制。我们提出了两个案例研究,其中对真实蜂窝网络流量数据的分析表明,我们可以识别这些条件。
{"title":"Using big data for more dependability: a cellular network tale","authors":"Nawanol Theera-Ampornpunt, S. Bagchi, Kaustubh R. Joshi, R. Panta","doi":"10.1145/2524224.2524227","DOIUrl":"https://doi.org/10.1145/2524224.2524227","url":null,"abstract":"There are many large infrastructures that instrument everything from network performance metrics to user activities. However, the collected data are generally used for long-term planning instead of improving reliability and user experience in real time. In this paper, we present our vision of how such collections of data can be used in real time to enhance the dependability of cellular network services. We first discuss mitigation mechanisms that can be used to improve reliability, but incur a high cost which prohibit them to be used except in certain conditions. We present two case studies where analyses of real cellular network traffic data show that we can identify these conditions.","PeriodicalId":436314,"journal":{"name":"Proceedings of the 9th Workshop on Hot Topics in Dependable Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130351202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An untold story of redundant clouds: making your service deployment truly reliable 关于冗余云的一个不为人知的故事:使您的服务部署真正可靠
Pub Date : 2013-11-03 DOI: 10.1145/2524224.2524231
Ennan Zhai, Ruichuan Chen, D. Wolinsky, B. Ford
To enhance the reliability of cloud services, many application providers leverage multiple cloud providers for redundancy. Unfortunately, such techniques fail to recognize that seemingly independent redundant clouds may share third-party infrastructure components, e.g., power sources and Internet routers, which could potentially undermine this redundancy. This paper presents iRec, a cloud independence recommender system. iRec recommends at best-effort independent redundancy services to application providers based on their requirements, minimizing costly and ineffective redundancy deployments. At iRec's heart lies a novel protocol that calculates the weighted number of overlapping infrastructure components among different cloud providers, while preserving the secrecy of each cloud provider's proprietary information. We sketch the iRec design, and discuss challenges and practical issues.
为了增强云服务的可靠性,许多应用程序提供商利用多个云提供商来实现冗余。不幸的是,这些技术没有认识到看似独立的冗余云可能共享第三方基础设施组件,例如电源和互联网路由器,这可能会破坏这种冗余。本文提出了一个独立于云的推荐系统iRec。iRec根据应用程序提供商的需求,尽可能地向他们推荐独立的冗余服务,从而最大限度地减少成本和无效的冗余部署。iRec的核心是一个新的协议,它可以计算不同云提供商之间重叠的基础设施组件的加权数量,同时保护每个云提供商专有信息的保密性。我们概述了iRec设计,并讨论了挑战和实际问题。
{"title":"An untold story of redundant clouds: making your service deployment truly reliable","authors":"Ennan Zhai, Ruichuan Chen, D. Wolinsky, B. Ford","doi":"10.1145/2524224.2524231","DOIUrl":"https://doi.org/10.1145/2524224.2524231","url":null,"abstract":"To enhance the reliability of cloud services, many application providers leverage multiple cloud providers for redundancy. Unfortunately, such techniques fail to recognize that seemingly independent redundant clouds may share third-party infrastructure components, e.g., power sources and Internet routers, which could potentially undermine this redundancy. This paper presents iRec, a cloud independence recommender system. iRec recommends at best-effort independent redundancy services to application providers based on their requirements, minimizing costly and ineffective redundancy deployments. At iRec's heart lies a novel protocol that calculates the weighted number of overlapping infrastructure components among different cloud providers, while preserving the secrecy of each cloud provider's proprietary information. We sketch the iRec design, and discuss challenges and practical issues.","PeriodicalId":436314,"journal":{"name":"Proceedings of the 9th Workshop on Hot Topics in Dependable Systems","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128159359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Towards effective and efficient search-based deterministic replay 朝着有效和高效的基于搜索的确定性重播方向发展
Pub Date : 2013-11-03 DOI: 10.1145/2524224.2524228
Manuel Bravo, Nuno Machado, P. Romano, L. Rodrigues
Deterministic replay tools are a useful asset when it comes to pinpoint hard-to-reproduce bugs. However, no sweet spot has yet been found with respect to the trade-off between recording overhead and bug reproducibility, especially in the context of search-based deterministic replay techniques, which rely on inference mechanisms. In this paper, we argue that tracing the locking order, along with the local control-flow path affected by shared variables, allows to dramatically reduce the inference time to find a fault-inducing trace, while imposing only a slight increase in the overhead during production runs. Preliminary evaluation with a micro-benchmark and third-party benchmarks provides initial evidence that supports our claim.
在精确定位难以重现的bug时,确定性重放工具非常有用。然而,关于记录开销和bug再现性之间的权衡,还没有找到最佳平衡点,特别是在依赖于推理机制的基于搜索的确定性重播技术的上下文中。在本文中,我们认为跟踪锁定顺序,以及受共享变量影响的本地控制流路径,可以显着减少发现故障诱导跟踪的推理时间,同时在生产运行期间只增加了轻微的开销。使用微基准测试和第三方基准测试进行的初步评估提供了支持我们的说法的初步证据。
{"title":"Towards effective and efficient search-based deterministic replay","authors":"Manuel Bravo, Nuno Machado, P. Romano, L. Rodrigues","doi":"10.1145/2524224.2524228","DOIUrl":"https://doi.org/10.1145/2524224.2524228","url":null,"abstract":"Deterministic replay tools are a useful asset when it comes to pinpoint hard-to-reproduce bugs. However, no sweet spot has yet been found with respect to the trade-off between recording overhead and bug reproducibility, especially in the context of search-based deterministic replay techniques, which rely on inference mechanisms. In this paper, we argue that tracing the locking order, along with the local control-flow path affected by shared variables, allows to dramatically reduce the inference time to find a fault-inducing trace, while imposing only a slight increase in the overhead during production runs. Preliminary evaluation with a micro-benchmark and third-party benchmarks provides initial evidence that supports our claim.","PeriodicalId":436314,"journal":{"name":"Proceedings of the 9th Workshop on Hot Topics in Dependable Systems","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123288682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Towards privacy-preserving fault detection 面向保护隐私的故障检测
Pub Date : 2013-11-03 DOI: 10.1145/2524224.2524233
Antonis Papadimitriou, Mingchen Zhao, Andreas Haeberlen
In this paper, we discuss the problem of detecting general faults in distributed systems that handle confidential information. Detecting non-crash faults is difficult in this setting because, to check the behavior of a given node, we need to know its expected behavior -- but that can depend on the confidential information. Classical zero-knowledge proofs are difficult to apply because they are designed to verify functions with a fixed number of inputs, but in many distributed systems, both the size and the number of a node's "inputs" (the messages it has received from other nodes) are not known. We propose an approach that can efficiently provide zero-knowledge fault detection for certain systems. Our approach spreads the detection tasks across multiple nodes, leveraging a node's existing knowledge whenever possible. We use epistemic reasoning to infer such knowledge, and we combine classical zero-knowledge proofs with a special data structure to handle inputs of unknown size. We show how our approach can be applied to a simple example system, and we report some initial performance measurements.
本文讨论了处理机密信息的分布式系统中一般故障的检测问题。在这种设置中,检测非崩溃故障很困难,因为要检查给定节点的行为,我们需要知道它的预期行为——但这可能取决于机密信息。经典的零知识证明很难应用,因为它们被设计为使用固定数量的输入来验证函数,但在许多分布式系统中,节点的“输入”(从其他节点接收的消息)的大小和数量都是未知的。提出了一种能够有效地为特定系统提供零知识故障检测的方法。我们的方法将检测任务分散到多个节点,尽可能地利用节点的现有知识。我们使用认知推理来推断这些知识,并将经典的零知识证明与特殊的数据结构相结合来处理未知大小的输入。我们展示了如何将我们的方法应用于一个简单的示例系统,并报告了一些初始性能度量。
{"title":"Towards privacy-preserving fault detection","authors":"Antonis Papadimitriou, Mingchen Zhao, Andreas Haeberlen","doi":"10.1145/2524224.2524233","DOIUrl":"https://doi.org/10.1145/2524224.2524233","url":null,"abstract":"In this paper, we discuss the problem of detecting general faults in distributed systems that handle confidential information. Detecting non-crash faults is difficult in this setting because, to check the behavior of a given node, we need to know its expected behavior -- but that can depend on the confidential information. Classical zero-knowledge proofs are difficult to apply because they are designed to verify functions with a fixed number of inputs, but in many distributed systems, both the size and the number of a node's \"inputs\" (the messages it has received from other nodes) are not known. We propose an approach that can efficiently provide zero-knowledge fault detection for certain systems. Our approach spreads the detection tasks across multiple nodes, leveraging a node's existing knowledge whenever possible. We use epistemic reasoning to infer such knowledge, and we combine classical zero-knowledge proofs with a special data structure to handle inputs of unknown size. We show how our approach can be applied to a simple example system, and we report some initial performance measurements.","PeriodicalId":436314,"journal":{"name":"Proceedings of the 9th Workshop on Hot Topics in Dependable Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134107694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Towards efficient, portable application-level consistency 朝着高效、可移植的应用级一致性发展
Pub Date : 2013-11-03 DOI: 10.1145/2524224.2524229
T. S. Pillai, Vijay Chidambaram, J. Hwang, A. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
Applications employ complex protocols to ensure consistency after system crashes. Such protocols are affected by the exact behavior of file systems. However, modern file systems vary widely in such behavior, reducing the correctness and performance of applications. In this paper, we study application-level crash consistency. Through the detailed study of two popular database libraries (SQLite, LevelDB), we show that application performance and correctness heavily depend on file-system properties previously ignored in research. We define a number of such properties and show that they vary widely among file systems. We conclude with implications for future file-system and dependability research.
应用程序采用复杂的协议来确保系统崩溃后的一致性。这些协议受到文件系统的确切行为的影响。然而,现代文件系统在这种行为上差异很大,降低了应用程序的正确性和性能。本文主要研究应用层的崩溃一致性。通过对两个流行的数据库库(SQLite, LevelDB)的详细研究,我们发现应用程序的性能和正确性在很大程度上依赖于文件系统属性,而这些属性在以前的研究中被忽略了。我们定义了许多这样的属性,并说明它们在不同的文件系统中差异很大。最后,对未来的文件系统和可靠性研究提出了建议。
{"title":"Towards efficient, portable application-level consistency","authors":"T. S. Pillai, Vijay Chidambaram, J. Hwang, A. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau","doi":"10.1145/2524224.2524229","DOIUrl":"https://doi.org/10.1145/2524224.2524229","url":null,"abstract":"Applications employ complex protocols to ensure consistency after system crashes. Such protocols are affected by the exact behavior of file systems. However, modern file systems vary widely in such behavior, reducing the correctness and performance of applications. In this paper, we study application-level crash consistency. Through the detailed study of two popular database libraries (SQLite, LevelDB), we show that application performance and correctness heavily depend on file-system properties previously ignored in research. We define a number of such properties and show that they vary widely among file systems. We conclude with implications for future file-system and dependability research.","PeriodicalId":436314,"journal":{"name":"Proceedings of the 9th Workshop on Hot Topics in Dependable Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114988628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Techniques for efficient in-memory checkpointing 高效的内存检查点技术
Pub Date : 2013-11-03 DOI: 10.1145/2524224.2524236
Dirk Vogt, Cristiano Giuffrida, H. Bos, A. Tanenbaum
Checkpointing is a pivotal technique in system research, with applications ranging from crash recovery to replay debugging. In this paper, we evaluate a number of in-memory checkpointing techniques and compare their properties. We also present a new compiler-based checkpointing scheme which improves state-of-the-art performance and memory guarantees in the general case. Our solution relies on a shadow state to efficiently store incremental in-memory checkpoints, at the cost of a smaller user-addressable virtual address space. Contrary to common belief, our results show that in-memory checkpointing can be implemented efficiently with moderate impact on production systems.
检查点是系统研究中的一项关键技术,其应用范围从崩溃恢复到重播调试。在本文中,我们评估了一些内存中检查点技术并比较了它们的特性。我们还提出了一种新的基于编译器的检查点方案,它在一般情况下提高了最先进的性能和内存保证。我们的解决方案依赖于影子状态来有效地存储增量内存检查点,代价是更小的用户可寻址虚拟地址空间。与通常的看法相反,我们的结果表明,内存中的检查点可以有效地实现,对生产系统的影响不大。
{"title":"Techniques for efficient in-memory checkpointing","authors":"Dirk Vogt, Cristiano Giuffrida, H. Bos, A. Tanenbaum","doi":"10.1145/2524224.2524236","DOIUrl":"https://doi.org/10.1145/2524224.2524236","url":null,"abstract":"Checkpointing is a pivotal technique in system research, with applications ranging from crash recovery to replay debugging. In this paper, we evaluate a number of in-memory checkpointing techniques and compare their properties. We also present a new compiler-based checkpointing scheme which improves state-of-the-art performance and memory guarantees in the general case. Our solution relies on a shadow state to efficiently store incremental in-memory checkpoints, at the cost of a smaller user-addressable virtual address space. Contrary to common belief, our results show that in-memory checkpointing can be implemented efficiently with moderate impact on production systems.","PeriodicalId":436314,"journal":{"name":"Proceedings of the 9th Workshop on Hot Topics in Dependable Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129956582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Proceedings of the 9th Workshop on Hot Topics in Dependable Systems 第九届可靠系统热点研讨会论文集
Pub Date : 2013-11-03 DOI: 10.1145/2524224
C. Cachin, R. V. Renesse
{"title":"Proceedings of the 9th Workshop on Hot Topics in Dependable Systems","authors":"C. Cachin, R. V. Renesse","doi":"10.1145/2524224","DOIUrl":"https://doi.org/10.1145/2524224","url":null,"abstract":"","PeriodicalId":436314,"journal":{"name":"Proceedings of the 9th Workshop on Hot Topics in Dependable Systems","volume":"363 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124566387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verifying the correctness of remote executions: from wild implausibility to near practicality 验证远程执行的正确性:从不切实际到近乎实用
Pub Date : 2013-11-03 DOI: 10.1145/2524224.2524225
Michael Walfish
How can we trust results computed by a third party, or the integrity of data stored by such a party? This is a classic question in systems security, and it is particularly relevant today, as much computation is now outsourced: it is performed by machines that are rented, remote, or both. Various solutions have been proposed that make assumptions about the class of computations, the failure modes of the performing computer, etc. However, deep results in theoretical computer science---interactive proofs (IPs) [3, 9, 10, 13, 19] and probabilistically checkable proofs (PCPs) [1, 2] (coupled with cryptographic commitments [11, 12] in the context of arguments [5])---tell us that a fully general solution exists that makes no assumptions about the third party: the local computer can check the correctness of a remotely executed computation by inspecting a succinct proof returned by the third party. The rub is practicality: if implemented naively, the theory would be preposterously expensive (e.g., trillions of CPU-years or more to verify simple computations). Over the last several years, a number of projects have brought this theory to near-practicality in the context of implemented systems [4, 6--8, 14--18, 20--22]. The pace of progress has been rapid, and there have been many encouraging developments in this emerging area of proof-based verifiable computation. My talk will cover the high-level problem, the theory that solves the problem in principle, the projects that have reduced the theory to near-practicality and implemented it, and open questions for the area. My hope is to communicate the excitement surrounding all of the projects in the area.
我们如何信任第三方计算的结果,或者第三方存储的数据的完整性?这是系统安全中的一个经典问题,并且在今天尤为重要,因为现在许多计算都外包了:它由租用的、远程的或两者兼而有之的机器执行。已经提出了各种解决方案,这些解决方案对计算类别、执行计算机的故障模式等进行了假设。然而,理论计算机科学的深入研究结果——交互式证明(ip)[3,9,10,13,19]和概率可检验证明(pcp)[1,2](加上参数[5]背景下的加密承诺[11,12])——告诉我们存在一个完全通用的解决方案,它不需要对第三方进行任何假设:本地计算机可以通过检查第三方返回的简洁证明来检查远程执行计算的正确性。问题在于实用性:如果天真地实现,该理论将会非常昂贵(例如,验证简单计算需要数万亿cpu年或更多时间)。在过去的几年里,许多项目已经将这一理论在实现系统的背景下接近实用性[4,6 - 8,14 - 18,20 -22]。进展的速度很快,在这个基于证明的可验证计算的新兴领域有许多令人鼓舞的发展。我的演讲将涵盖高层次的问题,原则上解决问题的理论,将理论降低到接近实用性并实现它的项目,以及该领域的开放性问题。我的希望是传达围绕该地区所有项目的兴奋。
{"title":"Verifying the correctness of remote executions: from wild implausibility to near practicality","authors":"Michael Walfish","doi":"10.1145/2524224.2524225","DOIUrl":"https://doi.org/10.1145/2524224.2524225","url":null,"abstract":"How can we trust results computed by a third party, or the integrity of data stored by such a party? This is a classic question in systems security, and it is particularly relevant today, as much computation is now outsourced: it is performed by machines that are rented, remote, or both. Various solutions have been proposed that make assumptions about the class of computations, the failure modes of the performing computer, etc. However, deep results in theoretical computer science---interactive proofs (IPs) [3, 9, 10, 13, 19] and probabilistically checkable proofs (PCPs) [1, 2] (coupled with cryptographic commitments [11, 12] in the context of arguments [5])---tell us that a fully general solution exists that makes no assumptions about the third party: the local computer can check the correctness of a remotely executed computation by inspecting a succinct proof returned by the third party. The rub is practicality: if implemented naively, the theory would be preposterously expensive (e.g., trillions of CPU-years or more to verify simple computations). Over the last several years, a number of projects have brought this theory to near-practicality in the context of implemented systems [4, 6--8, 14--18, 20--22]. The pace of progress has been rapid, and there have been many encouraging developments in this emerging area of proof-based verifiable computation. My talk will cover the high-level problem, the theory that solves the problem in principle, the projects that have reduced the theory to near-practicality and implemented it, and open questions for the area. My hope is to communicate the excitement surrounding all of the projects in the area.","PeriodicalId":436314,"journal":{"name":"Proceedings of the 9th Workshop on Hot Topics in Dependable Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114403877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PSCloud: a durable context-aware personal storage cloud PSCloud:一个持久的上下文感知个人存储云
Pub Date : 2013-11-03 DOI: 10.1145/2524224.2524235
S. Bazarbayev, M. Hiltunen, Kaustubh R. Joshi, W. Sanders, R. Schlichting
Personal content from mobile devices is often irreplaceable, yet current solutions for managing and synchronizing this data across multiple devices to ensure durability are often limited. A common approach is to synchronize data through a cloud storage service such as Dropbox. We argue that this model is excessively rigid because it forces users to use more expensive cloud storage than is needed. This paper proposes an alternative approach that uses storage on all of a user's mobile devices, home servers, and cloud storage accounts to create a single unified personal storage system called PSCloud in which data is automatically cached, replicated, and placed to enable reliable access across all devices while minimizing network access and storage costs. This approach is based on a per-device network context-graph that tracks connectivity relationships between a user's devices and storage options over time. Preliminary experiments show that combining such context with techniques that exploit content similarity across devices to make placement decisions can lead to substantial reductions in cloud storage and network usage.
来自移动设备的个人内容通常是不可替代的,但目前用于跨多个设备管理和同步这些数据以确保持久性的解决方案通常是有限的。一种常见的方法是通过云存储服务(如Dropbox)同步数据。我们认为这种模式过于僵化,因为它迫使用户使用比实际需要更昂贵的云存储。本文提出了一种替代方法,即使用用户所有移动设备、家庭服务器和云存储帐户上的存储来创建一个名为PSCloud的统一个人存储系统,其中数据被自动缓存、复制和放置,以实现跨所有设备的可靠访问,同时最大限度地减少网络访问和存储成本。这种方法基于每个设备的网络上下文图,跟踪用户设备和存储选项之间的连接关系。初步实验表明,将这种环境与利用设备间内容相似性来做出放置决策的技术相结合,可以大大减少云存储和网络的使用。
{"title":"PSCloud: a durable context-aware personal storage cloud","authors":"S. Bazarbayev, M. Hiltunen, Kaustubh R. Joshi, W. Sanders, R. Schlichting","doi":"10.1145/2524224.2524235","DOIUrl":"https://doi.org/10.1145/2524224.2524235","url":null,"abstract":"Personal content from mobile devices is often irreplaceable, yet current solutions for managing and synchronizing this data across multiple devices to ensure durability are often limited. A common approach is to synchronize data through a cloud storage service such as Dropbox. We argue that this model is excessively rigid because it forces users to use more expensive cloud storage than is needed. This paper proposes an alternative approach that uses storage on all of a user's mobile devices, home servers, and cloud storage accounts to create a single unified personal storage system called PSCloud in which data is automatically cached, replicated, and placed to enable reliable access across all devices while minimizing network access and storage costs. This approach is based on a per-device network context-graph that tracks connectivity relationships between a user's devices and storage options over time. Preliminary experiments show that combining such context with techniques that exploit content similarity across devices to make placement decisions can lead to substantial reductions in cloud storage and network usage.","PeriodicalId":436314,"journal":{"name":"Proceedings of the 9th Workshop on Hot Topics in Dependable Systems","volume":"44 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120941796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
Proceedings of the 9th Workshop on Hot Topics in Dependable Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1