pith. sign in

arxiv: 1808.09682 · v1 · pith:YLVKQMPSnew · submitted 2018-08-29 · 💻 cs.CR

Fair Marketplace for Secure Outsourced Computations

classification 💻 cs.CR
keywords clientscomputationskostooutsourcedresourcescomputingexecutionfair
0
0 comments X
read the original abstract

The cloud computing paradigm offers clients ubiquitous and on demand access to a shared pool of computing resources, enabling the clients to provision scalable services with minimal management effort. Such a pool of resources, however, is typically owned and controlled by a single service provider, making it a single-point-of-failure. This paper presents Kosto - a framework that provisions a fair marketplace for secure outsourced computations, wherein the pool of computing resources aggregates resources offered by a large cohort of independent compute nodes. Kosto protects the confidentiality of clients' inputs as well as the integrity of the outsourced computations and their results using trusted hardware's enclave execution, in particular Intel SGX. Furthermore, Kosto warrants fair exchanges between the clients' payments for the execution of an outsourced computations and the compute nodes' work in servicing the clients' requests. Empirical evaluation on the prototype implementation of Kosto shows that performance overhead incurred by enclave execution is as small as 3% for computation-intensive operations, and 1.5x for IO-intensive operations.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. CHRONOS: A Hardware-Assisted Phase-Decoupled Framework for Secure Federated Learning in IoT

    cs.CR 2026-04 unverdicted novelty 6.0

    CHRONOS decouples cryptographic setup from training in federated learning via hardware enclaves and Shamir shares, reducing aggregation latency by up to 74% while resisting OS compromises and gradient inversion.