• DocumentCode
    3352479
  • Title

    Trusted computation with an adversarial cloud

  • Author

    Bopardikar, Shaunak D. ; Speranzon, Alberto ; Langbort, Cedric

  • Author_Institution
    Syst. Dept., United Technol. Res. Center, East Hartford, CT, USA
  • fYear
    2015
  • fDate
    1-3 July 2015
  • Firstpage
    2445
  • Lastpage
    2452
  • Abstract
    We consider the problem of computation in a cloud environment where either the data or the computation may be corrupted by an adversary. We assume that a small fraction of the data is stored locally at a client during the upload process to the cloud and that this data is trustworthy. We formulate the problem within a game theoretic framework where the client needs to decide an optimal fusion strategy using both non-trusted information from the cloud and local trusted data, given that the adversary on the cloud is trying to deceive the client by biasing the output to a different value/set of values. We adopt an Iterated Best Response (IBR) scheme for each player to update its action based on the opponent´s announced computation. At each iteration, the cloud reveals its output to the client, who then computes the best response as a linear combination of its private local estimate and of the untrusted cloud output. We characterize equilibrium conditions for both the scalar and vector cases of the computed value of interest. Necessary and sufficient conditions for convergence for the IBR are derived and insightful geometric interpretations of such conditions is discussed for the vector case. Numerical results are presented showing the convergence conditions are relatively tight.
  • Keywords
    cloud computing; game theory; geometry; iterative methods; optimisation; security of data; trusted computing; vectors; IBR scheme; adversarial cloud computing; game theoretic framework; geometric interpretation; iterated best response; optimal fusion strategy; trusted computation; vector case; Algorithm design and analysis; Convergence; Cost function; Games; Protocols; Random variables; Security; Adversarial Machine Learning; Equilibrium; Game theory; Trusted Computation;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    American Control Conference (ACC), 2015
  • Conference_Location
    Chicago, IL
  • Print_ISBN
    978-1-4799-8685-9
  • Type

    conf

  • DOI
    10.1109/ACC.2015.7171099
  • Filename
    7171099