UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike...

24
1 NL 15 March 2005 CSIIR Wor Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of Tennessee currently on leave to Computer Science and Mathematics Division Oak Ridge National Laboratory USA

Transcript of UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike...

Page 1: UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of.

1UT-ORNL 15 March 2005 CSIIR Workshop

Trusted Computing Amidst Untrustworthy Intermediaries

Mike Langston

Department of Computer ScienceUniversity of Tennessee

currently on leave to

Computer Science and Mathematics DivisionOak Ridge National Laboratory

USA

Page 2: UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of.

2UT-ORNL 15 March 2005 CSIIR Workshop

Overview

Programs

Data

Highly Parallel

Scalable Network

Variable Topology

Internet Like

But Untrusted!

Page 3: UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of.

3UT-ORNL 15 March 2005 CSIIR Workshop

Possible Solutions

• Accept faulty results. Uh, no thanks.

• Authenticate/verify by central authority. Unrealistic, does not scale.

• Exploit complexity and checkability. Problems in NP can be hard to solve -- but they are

always easy to check! No need for centralized control, ownership, or verification.

Page 4: UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of.

4UT-ORNL 15 March 2005 CSIIR Workshop

A Little Complexity Theory

The Classic View:

P NP PSPACEΣ 2

P… …

“easy”

Page 5: UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of.

5UT-ORNL 15 March 2005 CSIIR Workshop

A Little Complexity Theory

• The Classic View:

P NP PSPACEΣ 2

P… …

“easy”

“hard”

NP-complete

Page 6: UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of.

6UT-ORNL 15 March 2005 CSIIR Workshop

A Little Complexity Theory

• The Classic View:

P NP PSPACEΣ 2

P… …

“easy”

“hard”

“fuggettaboutit”

Page 7: UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of.

7UT-ORNL 15 March 2005 CSIIR Workshop

Parameter Sensitivity: Instance(n,k)

• Suppose our problem is, say, NP-complete.

• Consider an algorithm with a time bound such as O(2k+n).

• And now one with a time bound more like O(2k+n).

Page 8: UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of.

8UT-ORNL 15 March 2005 CSIIR Workshop

Parameter Sensitivity: Instance(n,k)

• Suppose our problem is, say, NP-complete.

• Consider an algorithm with a time bound such as O(2k+n).

• And now one with a time bound more like O(2k+n).

• Both are exponential in parameter value(s).

Page 9: UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of.

9UT-ORNL 15 March 2005 CSIIR Workshop

Parameter Sensitivity: Instance(n,k)

• Suppose our problem is, say, NP-complete.

• Consider an algorithm with a time bound such as O(2k+n).

• And now one with a time bound more like O(2k+n).

• Both are exponential in parameter value(s).

• But what happens when k is fixed?

Page 10: UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of.

10UT-ORNL 15 March 2005 CSIIR Workshop

Parameter Sensitivity: Instance(n,k)

• Suppose our problem is, say, NP-complete.• Consider an algorithm with a time bound

such as O(2k+n).• And now one with a time bound more like

O(2k+n).• Both are exponential in parameter value(s).• But what happens when k is fixed?• Fixed Parameter Tractability: confines

superpolynomial behavior to the parameter.

Page 11: UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of.

11UT-ORNL 15 March 2005 CSIIR Workshop

Complexity Theory, Revised

Hence, the Parameterized View:

FPT … …W[1] W[2] XP

“solvable (even if

NP-complete)”

Page 12: UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of.

12UT-ORNL 15 March 2005 CSIIR Workshop

Complexity Theory, Revised

The Parameterized View:

FPT … …W[1] W[2] XP

“solvable (even if NP-hard!)”

“heuristics only”

Page 13: UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of.

13UT-ORNL 15 March 2005 CSIIR Workshop

Complexity Theory, Revised

The Parameterized View:

FPT … …W[1] W[2] XP

“solvable (even if NP-hard!)”

“heuristics only”

“I said fuggettaboutit!”

Page 14: UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of.

14UT-ORNL 15 March 2005 CSIIR Workshop

Target Problems

• Not membership in P (assuming P≠NP) hard to compute

Page 15: UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of.

15UT-ORNL 15 March 2005 CSIIR Workshop

Target Problems

• Not membership in P (assuming P≠NP) hard to compute

• Membership in NP easy to check

Page 16: UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of.

16UT-ORNL 15 March 2005 CSIIR Workshop

Target Problems

NP-complete FPT

• Not membership in P (assuming P≠NP) hard to compute

• Membership in NP easy to check

• Fixed Parameter Tractable use kernelization and branching

Page 17: UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of.

17UT-ORNL 15 March 2005 CSIIR Workshop

Kernelization

• Consider Clique and Vertex Cover

• High Degree Rule(s)

• Low Degree Rule(s)

• LP, Crown Reductions – kernel of linear size, and extreme density – the “hard part” of the problem instance

Page 18: UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of.

18UT-ORNL 15 March 2005 CSIIR Workshop

Branching

• Let’s stay with Clique and Vertex Cover

• Bounded tree search

• Depth at most k

• With this technique, we can now solve vertex cover in O(1.28k+n) time

• Easily parallelizable

• No processor sees another’s work, nor the original graph

Page 19: UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of.

19UT-ORNL 15 March 2005 CSIIR Workshop

. . . . . .

Untrusted intermediaries cannot deduce data

Datadecomposition

Nor can they spoof answers

Answer check (NP certificate)

.

Branching as A Form of

Cyber Security

Page 20: UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of.

20UT-ORNL 15 March 2005 CSIIR Workshop

Overall Appeal

• Verifiability– easy to check answers: a faulty or malicious

processor cannot invalidate or subvert computations

Page 21: UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of.

21UT-ORNL 15 March 2005 CSIIR Workshop

Overall Appeal

• Verifiability– easy to check answers: a faulty or malicious

processor cannot invalidate or subvert computations

• Security– damage from intrusion contained: strong concealment

of the total problem is a natural part of this method

Page 22: UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of.

22UT-ORNL 15 March 2005 CSIIR Workshop

Overall Appeal

• Verifiability– easy to check answers: a faulty or malicious

processor cannot invalidate or subvert computations

• Security– damage from intrusion contained: strong concealment

of the total problem is a natural part of this method

• Scalability– branching translates into partitioning: no a priori

bounds on the degree of parallelism

Page 23: UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of.

23UT-ORNL 15 March 2005 CSIIR Workshop

Overall Appeal

• Verifiability– easy to check answers: a faulty or malicious

processor cannot invalidate or subvert computations • Security

– damage from intrusion contained: strong concealment of the total problem is a natural part of this method

• Scalability– branching translates into partitioning: no a priori

bounds on the degree of parallelism• Robustness

– subtrees are compartmentalized: processes can be reassigned at will

Page 24: UT-ORNL 15 March 2005 CSIIR Workshop 1 Trusted Computing Amidst Untrustworthy Intermediaries Mike Langston Department of Computer Science University of.

24UT-ORNL 15 March 2005 CSIIR Workshop

Research Thrusts

• Range of amenable problems? – FPT– non FPT

• Ubiquity of untrustworthy processors?– grid computing – unbrokered resource sharing

• Relationship to traditional forms of security?– internet-style lightweight security– no heavyweight authentication needed