This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Entrusting Private Computation and Data to Untrusted Networks
July-Aug. 2013 (vol. 10 no. 4)
pp. 225-238
Y. Brun, Sch. of Comput. Sci., Univ. of Massachusetts, Amherst, MA, USA
N. Medvidovic, Comput. Sci. Dept., Univ. of Southern California, Los Angeles, CA, USA
We present sTile, a technique for distributing trust-needing computation onto insecure networks, while providing probabilistic guarantees that malicious agents that compromise parts of the network cannot learn private data. With sTile, we explore the fundamental cost of achieving privacy through data distribution and bound how much less efficient a privacy-preserving system is than a nonprivate one. This paper focuses specifically on NP-complete problems and demonstrates how sTile-based systems can solve important real-world problems, such as protein folding, image recognition, and resource allocation. We present the algorithms involved in sTile and formally prove that sTile-based systems preserve privacy. We develop a reference sTile-based implementation and empirically evaluate it on several physical networks of varying sizes, including the globally distributed PlanetLab testbed. Our analysis demonstrates sTile's scalability and ability to handle varying network delay, as well as verifies that problems requiring privacy-preservation can be solved using sTile orders of magnitude faster than using today's state-of-the-art alternatives.
Index Terms:
delays,cloud computing,computational complexity,data privacy,cloud computing,private computation,private data,untrusted networks,trust-needing computation distribution,insecure networks,probabilistic guarantees,malicious agents,data privacy,data distribution,privacy-preserving system,NP-complete problems,sTile-based systems,reference sTile-based implementation,physical networks,globally distributed PlanetLab testbed,sTile scalability,network delay,Assembly,Crystals,Privacy,NP-complete problem,Computational modeling,Data privacy,tile assembly model,Privacy,trusted computing,untrusted networks,distributed computation,PlanetLab,sTile
Citation:
Y. Brun, N. Medvidovic, "Entrusting Private Computation and Data to Untrusted Networks," IEEE Transactions on Dependable and Secure Computing, vol. 10, no. 4, pp. 225-238, July-Aug. 2013, doi:10.1109/TDSC.2013.13
Usage of this product signifies your acceptance of the Terms of Use.