First Year Talk: Self-Enforcing Automatic Rational Contracts between Computers Brian Shand Supervisor: Dr Jean Bacon.

Slides:



Advertisements
Similar presentations
All rights reserved © 2005, Alcatel Grid services over IP Multimedia Subsystem  Antoine Pichot, Olivier Audouin, Alcatel  GridNets ’06.
Advertisements

Seyedehmehrnaz Mireslami, Mohammad Moshirpour, Behrouz H. Far Department of Electrical and Computer Engineering University of Calgary, Canada {smiresla,
CSE300-1 Profs. Steven A. Demurjian Q. Jin, J. Nam, Z. Qian and C. Phillips Computer Science & Engineering Department 191 Auditorium Road, Box U-155 The.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
Enabling Social and Economic Behaviour based on Reliable Resource Metrics Gabriele Pierantoni, and Keith Rochford. Trinity College Dublin CGW 07 – Krakow.
Data Storage Strategy Brian Boyle Network Services Manager HEAnet.
Social Cloud Computing: A Vision for Socially Motivated Resource Sharing IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 5, NO. 4, OCTOBER- DECEMBER 2012.
Cereus: CyberInfrastructure Environments for Resource Exchange and Utility Services Duke University, Department of Computer Science
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
© Siemens AG 2001 Software & Systems Architectures - Mobile Computing Proposed Research Topics Cooperation between Siemens and UCB March 27, 2001 Visit.
P2P Network for Very Large Virtual Environment Proceedings of the ACM symposium on virtual reality software and technology VRST '06.
A Grid Resource Broker Supporting Advance Reservations and Benchmark- Based Resource Selection Erik Elmroth and Johan Tordsson Reporter : S.Y.Chen.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Trust and Grid Computing Systems Presented By: Woodas Lai.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Load Adaptation: Options for Basic Services Vance Maverick ADAPT Bologna Feb. 13, 2003.
Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊.
WAWC Workshop How to evaluate the disruptiveness potential of new wireless technologies – perspectives of ICT industry players Liisa-Maija Sainio,
UNICORE UNiform Interface to COmputing REsources Olga Alexandrova, TITE 3 Daniela Grudinschi, TITE 3.
The Open Grid Service Architecture (OGSA) Standard for Grid Computing Prepared by: Haoliang Robin Yu.
Efficient agent-based selection of DiffServ SLAs over MPLS networks Thanasis G. Papaioannou a,b, Stelios Sartzetakis a, and George D. Stamoulis a,b presented.
Brian Shand Jean Bacon
PORTIA Robert Grimm New York University Security Challenges for Rich-Media Educational Environments.
Opera Group Presentation: Policies in Accountable Contracts Brian Shand 16 April 2002.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Active Network Applications Tom Anderson University of Washington.
Self-Adaptive QoS Guarantees and Optimization in Clouds Jim (Zhanwen) Li (Carleton University) Murray Woodside (Carleton University) John Chinneck (Carleton.
Security in Virtual Laboratory System Jan Meizner Supervisor: dr inż. Marian Bubak Consultancy: dr inż. Maciej Malawski Master of Science Thesis.
TeraGrid Science Gateways: Scaling TeraGrid Access Aaron Shelmire¹, Jim Basney², Jim Marsteller¹, Von Welch²,
Yongzhi Wang, Jinpeng Wei VIAF: Verification-based Integrity Assurance Framework for MapReduce.
Frascati, October 9th, Accounting in DataGrid Initial Architecture Albert Werbrouck Frascati, October 9, 2001.
Frascati, October 5th, Accounting in DataGrid Preliminary Proposal and basis for discussion Stefano Barale Frascati, October.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
Generic model for services: health domain study Zoran Milosevic Deontik, Australia
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
SWIM-SUIT Information Models & Services
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Cascading Payment Content Exchange (CasPaCE) Framework for P2P Networks Gurleen Arora Supervisors: Dr. M. Hanneghan & Prof. M. Merabti Networked Appliances.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
WS-Trust “From each,according to his ability;to each, according to his need. “ Karl marx Ahmet Emre Naza Selçuk Durna
Technical Break-out group What are the biggest issues form past projects – need for education about standards and technologies to get everyone on the same.
Chapter 4 Using Encryption in Cryptographic Protocols & Practices.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Task 1.2 Context: definition and specification. Leuven, 14 oktober 2004 Outline Introduction Work method Context definition Context specification  Overview.
Investigating the Performance of Audio/Video Service Architecture I: Single Broker Ahmet Uyar & Geoffrey Fox Tuesday, May 17th, 2005 The 2005 International.
Fonkey Project Update: Target Applications TechSec WG, RIPE-45 May 14, 2003 Yuri Demchenko.
Grid and Cloud Computing Alessandro Usai SWITCH Sergio Maffioletti Grid Computing Competence Centre - UZH/GC3
CoreGRID Workpackage 5 Virtual Institute on Grid Information and Monitoring Services Michał Jankowski, Paweł Wolniewicz, Jiří Denemark, Norbert Meyer,
Development of e-Science Application Portal on GAP WeiLong Ueng Academia Sinica Grid Computing
Chapter 14 Advanced Architectural Styles. Objectives Describe the characteristics of a distributed system Explain how middleware supports distributed.
Fall 2006CS 395: Computer Security1 Key Management.
+ Support multiple virtual environment for Grid computing Dr. Lizhe Wang.
Enabling Grids for E-sciencE Agreement-based Workload and Resource Management Tiziana Ferrari, Elisabetta Ronchieri Mar 30-31, 2006.
Open Reputation Systems. Overview OASIS ORMS (Open Reputation Management Systems) introduction Use cases, requirements and model ENISA Paper on Security.
System Software Laboratory Databases and the Grid by Paul Watson University of Newcastle Grid Computing: Making the Global Infrastructure a Reality June.
Trusted Component Deployment Trusted Components Bernd Schoeller January 30 th, 2006.
Presented by Edith Ngai MPhil Term 3 Presentation
JRA3 Introduction Åke Edlund EGEE Security Head
.NET Remoting Priyanka Bharatula.
The Open Grid Service Architecture (OGSA) Standard for Grid Computing
NAAS 2.0 Features and Enhancements
A Component-based Architecture for Mobile Information Access
Wide Area Workload Management Work Package DATAGRID project
NIST Cloud Computing Reference Architecture
Advanced Computer Networks
Presentation transcript:

First Year Talk: Self-Enforcing Automatic Rational Contracts between Computers Brian Shand Supervisor: Dr Jean Bacon

2 Overview Motivation –Importance of distributed services –Risk of untrustworthy participants –Self-funding services and quality guarantees Outline of Proposal 1.Contracting architecture, combined with 2.Automatic trustworthiness measurements, in a 3.Resource-based virtual economy

3 Introduction Application Scenarios –Compute servers (‘the Grid’) –Web services –Peer-to-peer services –Publish-subscribe middleware – e.g. Active City Contract definitions –A contract prescribes actions to be taken by each participant –By signing the contract, each participant promises to be bound by it –A contract is agreed upon when all participants have signed it –A contract is cancelled when everyone signs a special cancellation message

4 Contract Description Contract representation –Server and client identities –Expected resource requirements –Accounting function –Contract action Contract Language –Limited language: predictable execution time –High-level description of resource exchange –Allows introspectible contracts Example Accounting Function def processResourceAtom(self, atom, imports): if atom.type != resources.cpuTime: return [] # Charge for CPU only rate = imports[0] if self.totalCPU < 10: result = rate+0.01 else: result = rate self.totalCPU += atom.quantity return [ResourceAtom( resources.money, '£', result*atom.quantity, atom.startTime, atom.endTime) ]

5 Trust Framework Second order trust model –Trust, distrust, uncertainty –Based on subjective opinions –Constantly updated with new data Trust delegation certificates –Web of trust, c.f. PGP recommendations –Distributed trust management –Also local credit bureaux

6 Resource Economy Homogeneous model –of money, trust, CPU, network, storage etc. Multi-scale representation Accounting of all resources Benefits Rational resource allocation Continuous trust update Economic services

7 Proxy prototype Structure Demonstrates charging for web services Charges based on location and bandwidth used Contracts prioritised by profitability –Identifies fraud –Prevents simple Denial of Service attacks Complex pricing schemes possible Client Client proxy Server proxy Server HTTP + contracts

8 Conclusion Contract architecture supports distributed computing services Separation of task acceptance and performance –introspectible contracts –explicit risk assessments Distributed trust model deters cheats Further work Model risks of stolen signatures –Distrust in own actions Compare costs of ad hoc vs trust-based policies Application to publish-subscribe systems –Trusted distribution network –Untrusted distribution network