Adaptive redundant residue system for cloud computing: a processor-oblivious and fault-oblivious technology

Size: px
Start display at page:

Download "Adaptive redundant residue system for cloud computing: a processor-oblivious and fault-oblivious technology"

Transcription

1 Adaptive redundant residue system for cloud computing: a processor-oblivious and fault-oblivious technology Jean-Louis ROCH INRIA MOAIS team, LIG lab. Grenoble Université, France Joint work with C. Pernet [1], T. Roche [1, 4], S. Varrette [3, 2], S. Jafar [2], A. Krings [2], B. Cunche [4], M. Khonji[1], T. Stalinski[1] Computer Science Dept, University of Western Ontario Monday January 24, 2011

2 Plan Introduction High performance computing and cloud Related works on trusting the clouds Cloud computing and performance ABFT Redundant residue codes Homomorphic residue system Over Z: Mandelbaum algorithm Over K[X]: Reed Solomon point of view Generalization Adaptive approach First approach and the gap Experiments Early termination

3 Context: High Performance Interactive Computation INRIA - LIG Moais team Performance: multi-criteria trade-off computation latency and computation bandwidth Application domains: interactive simulations (latency), computer algebra (bandwidth),...

4 HPC platforms From low computation latency to high computation bandwidth Parallel chips & multi/many-core architectures: multicore cpu, GP-GPU, FPGA, MPSoCs Servers: Multi-processor with sharedi memory (CPUs + GPUs+...) Clusters: 72% of top 500 machines, Heterogeneous (CPUs + GPUs +...) E.g. Tianhe-1A, ranked 1 in TOP500 nov 2010: 4.7 PFlops Global computing platforms: grids, P2P, clouds E.g. BOINC : in April 2010= 5.1 PFlops

5 Cloud / Global computing platforms Applications Data sharing (1980 s), Data storage, Computation (1990 s) Unbound computation bandwidth Volunteer Computing: steal idle cycles through the Internet Folding@Home 5 PFLOPS, as of March 17, 2009 MilkyWay@Home PFLOPS, as of April 2010 Thanks to GPUs!

6 Grid or cloud? Beyond computation bandwidth, two important criteria: granularity: how small is the smallest bit of computational resource that you can buy; speed of scaling: how long it takes to increase the size of available resources.

7 Global computing architecture and trust Open platforms are subject to attacks: machine badly configured, over clocking, malicious programs, client patched and redistributed: possibly large scale Parallel Application f1 f4 f1 f2 f3 f4 f5 s1 s1 s2 f3 f2 user INTERNET s2 f5

8 Global computing architecture and trust Open platforms are subject to attacks: machine badly configured, over clocking, malicious programs, client patched and redistributed: possibly large scale Parallel Application f1 f4 f1 f2 f3 f4 f5 s1 s1 s2 f3 f2 user modified result INTERNET hacker s2 f5

9 Global computing platforms: drawbacks Peers volatility Peers can join/leave at any time. Faults, crashes As the number of nodes increases, the number of faults, process crashes increases as well. Trust in Peers Malicious Peers (intentionally or infected by malwares). Random Crashes Random Forgeries Byzantine behaviour (e.g., Peers collusion)

10 Related work: trusting the Cloud Volatility Replication, (partial) Re-execution, Checkpoint/restart Trust Challenges / blacklisting [Sramenta&ak 01] Replication of tasks: BOINC: credit evaluation Byzantine agreement: n processes for n/3 faulty (one-third faulty replicas [Lamport82s] ) Check / Verification using postconditions (on the output) [Blum97]

11 Related work: trusting the Cloud Volatility Replication, (partial) Re-execution, Checkpoint/restart Trust Challenges / blacklisting [Sramenta&ak 01] expensive Replication of tasks: BOINC: credit evaluation Attacks can be adjusted Byzantine agreement: n processes for n/3 faulty (one-third faulty replicas [Lamport82s] ) often expensive Check / Verification using postconditions (on the output) [Blum97] not always possible

12 Related work: trusting the Cloud Without trust assumptions, basic properties (eg integrity, atomicity, weak consistency,...) cannot be guaranteed But, by maintaining a small amount of trusted memory and trusted computation units, well-known cryptographic methods reduce the need for trust in the storage [Cachin&al. ACM SIGACT 2009] integrity by storing small hash (hash tree for huge data) authentication of data proofs of retrievability (POR) and of data possession (PDP)

13 Considered cloud computing platform = Two disjoint set of resources: U: The cloud, unreliable R: Resources blindly trusted by the user (reliable), but with limited computation bandwidth interconnected through a stable memory Safe Resources Controler Verifier Checkpoint Server Unsafe Resources Grid INTERNET user

14 Plan Introduction High performance computing and cloud Related works on trusting the clouds Cloud computing and performance ABFT Redundant residue codes Homomorphic residue system Over Z: Mandelbaum algorithm Over K[X]: Reed Solomon point of view Generalization Adaptive approach First approach and the gap Experiments Early termination

15 How to take benefit of the Cloud for HPiC? Performance and correction Performance: massive parallelism (work depth) workstealing, adaptive scheduling [Leiserson&al. 2007] Correction of the results: proof verifications on R (e.g. randomized checking) Fault tolerance: to support resilience and/or errors ABFT: Algorithm Based Fault Tolerance

16 Execution time model on the cloud Resource average computation Total computation Usage type bandwidth per proc bandwidth Cloud U Π U Π tot U Client R Π R Π tot R bandwidth: number of unit operations per second computation certification Bound on the time required for computation+certification Based on work-stealing, with high probability [Bender-Rabin02] : Execution time W ( ) c Dc Π tot + O + W ( ) r Dr Π U U Π tot + O. Π R R Notations and target context: W c (resp. D c ) = total work (resp. depth) executed on the cloud U; W r (resp. D r ) = total work (resp. depth) executed on the client R; Target context: W c = O(W 1+ɛ 1 ); D c W c ; W r, D r D c. Correction: may be computed either on R, or on U, or on both.

17 Plan Introduction High performance computing and cloud Related works on trusting the clouds Cloud computing and performance ABFT Redundant residue codes Homomorphic residue system Over Z: Mandelbaum algorithm Over K[X]: Reed Solomon point of view Generalization Adaptive approach First approach and the gap Experiments Early termination

18 ABFT: Algorithmic Based Fault Tolerance Idea: incorporate redundancy in the algorithm [Huang&Abraham 98] [Saha 2006] [Dongarra & al. 2006] use properties specific to the problem

19 ABFT: Algorithmic Based Fault Tolerance Idea: incorporate redundancy in the algorithm [Huang&Abraham 98] [Saha 2006] [Dongarra & al. 2006] use properties specific to the problem Example: Matrix-vector product A u ua

20 ABFT: Algorithmic Based Fault Tolerance Idea: incorporate redundancy in the algorithm [Huang&Abraham 98] [Saha 2006] [Dongarra & al. 2006] use properties specific to the problem Example: Matrix-vector product A Id R u ua x

21 ABFT: Algorithmic Based Fault Tolerance Idea: incorporate redundancy in the algorithm [Huang&Abraham 98] [Saha 2006] [Dongarra & al. 2006] use properties specific to the problem Example: Matrix-vector product A Id R u ua x pre-compute the product B = A [ I R ] compute x = ub in parallel decode/correct x

22 Summary Typical considered global computation Interactive computation between R (reliable) and the cloud U (unreliable); On U: Computations loosely coupled and fault tolerant On R: submission of the computation correction (if not too much errors) verification (if not too much errors) homorphic residue system

23 Plan Introduction High performance computing and cloud Related works on trusting the clouds Cloud computing and performance ABFT Redundant residue codes Homomorphic residue system Over Z: Mandelbaum algorithm Over K[X]: Reed Solomon point of view Generalization Adaptive approach First approach and the gap Experiments Early termination

24 Homomorphic residue system One-to-one mapping Φ from E to E 1... E n that preserves the algebraic structure Φ : x x 1,... x n : projection Φ 1 (x 1,..., x n ): lifting For a fixed computation P (straight-line program): For input x: Φ(P x ) = Φ(P) x1,..., Φ(P) xn. Classical examples: residue number/polynomial systems: Polynomials: Φ(Q) = (Q(a 1 ),..., Q ( a n )) [evaluation/interpolation] Integers: Φ(x) = (x mod a 1,..., x mod a n ) a 1,..., a n : residue number system (relatively prime)

25 Integers: Chinese remainder algorithm Z/(n 1... n k )Z Z/n 1 Z Z/n k Z Computation of y = f (x) over Z begin Compute a bound β on max( f ); Pick n 1,... n k, pairwise prime, s.t. n 1... n k > β; for i = 1... k do Compute y i = f (x mod n i ) mod n i Compute y = CRT(y 1,..., y k ) end i CRT : Z/n 1 Z Z/n k Z Z/(n 1... n k )Z (x 1,..., x k ) k i=1 x iπ i Y i mod Π Π = k i=1 n i where Π i = Π/n i Y i = Π 1 i mod n i

26 Integers: Chinese remainder algorithm Z/(n 1... n k )Z Z/n 1 Z Z/n k Z Computation of y = f (x) over Z begin Compute a bound β on max( f ); Pick n 1,... n k, pairwise prime, s.t. n 1... n k > β; for i = 1... k do Compute y i = f (x mod n i ) mod n i ; /* Evaluation */ Compute y = CRT(y 1,..., y k ); /* Interpolation */ end i CRT : Z/n 1 Z Z/n k Z Z/(n 1... n k )Z (x 1,..., x k ) k i=1 x iπ i Y i mod Π Π = k i=1 n i where Π i = Π/n i Y i = Π 1 i mod n i

27 Chinese remaindering and evaluation/interpolation Evaluate P in a Reduce P modulo X a

28 Chinese remaindering and evaluation/interpolation Evaluate P in a Reduce P modulo X a Polynomials Evaluation: P mod X a Evaluate P in a Interpolation: P = k i=1 Q Q j i (X a j ) j i (a i a j )

29 Chinese remaindering and evaluation/interpolation Evaluate P in a Reduce P modulo X a Polynomials Evaluation: P mod X a Evaluate P in a Interpolation: P = k i=1 Q Q j i (X a j ) j i (a i a j ) Integers N mod m Evaluate N in m N = k i=1 a i j i m j( j i m j) 1[m i ]

30 Chinese remaindering and evaluation/interpolation Evaluate P in a Reduce P modulo X a Polynomials Evaluation: P mod X a Evaluate P in a Interpolation: P = k i=1 Q Q j i (X a j ) j i (a i a j ) Integers N mod m Evaluate N in m N = k i=1 a i j i m j( j i m j) 1[m i ] Analogy: complexities over Z over K [X] For a program with T algebr. algebraic operations: size of coefficients O ( log result T algebr. ) degree of polynomials O ( deg(result) T algebr. )

31 Chinese remaindering and evaluation/interpolation Evaluate P in a Reduce P modulo X a Polynomials Evaluation: P mod X a Evaluate P in a Interpolation: P = k i=1 Q Q j i (X a j ) j i (a i a j ) Integers N mod m Evaluate N in m N = k i=1 a i j i m j( j i m j) 1[m i ] Analogy: complexities over Z over K [X] For a program with T algebr. algebraic operations: size of coefficients O ( log result T algebr. ) det(n, A ) = O (n log A n ω ) degree of polynomials O ( deg(result) T algebr. ) det(n, d) = O (nd n ω )

32 Early termination Classic Chinese remaindering bound β on the result Choice of the n i : such that n 1... n k > β deterministic algorithm

33 Early termination Classic Chinese remaindering bound β on the result Choice of the n i : such that n 1... n k > β deterministic algorithm Early termination For each new modulo n i : reconstruct y i = f (x) mod n 1 n i If y i = y i 1 terminated if n i chosen at random: randomized algorithm (Monte Carlo)

34 Early termination Classic Chinese remaindering bound β on the result Choice of the n i : such that n 1... n k > β deterministic algorithm Early termination For each new modulo n i : reconstruct y i = f (x) mod n 1 n i If y i = y i 1 terminated if n i chosen at random: randomized algorithm (Monte Carlo) Advantage: Adaptive number of moduli depending on the output value Interesting when pessimistic bound: sparse/structured matrices,... no bound available

35 Redundant residues codes Principle: Chinese remaindering based parallelization Byzantines faults affecting some modular computations Fault tolerant reconstruction Algorithm Based Fault Tolerance (ABFT)

36 Plan Introduction High performance computing and cloud Related works on trusting the clouds Cloud computing and performance ABFT Redundant residue codes Homomorphic residue system Over Z: Mandelbaum algorithm Over K[X]: Reed Solomon point of view Generalization Adaptive approach First approach and the gap Experiments Early termination

37 Mandelbaum algorithm over Z Chinese Remainder Theorem x Z x 1 x 2... x k where p 1 p k > x and x i = x mod p i i

38 Mandelbaum algorithm over Z Chinese Remainder Theorem x Z x 1 x 2... x k x k+1... x n where p 1 p n > x and x i = x mod p i i

39 Mandelbaum algorithm over Z Chinese Remainder Theorem x Z x 1 x 2... x k x k+1... x n where p 1 p n > x and x i = x mod p i i Definition { (n, k)-code: C = { x < p1... p (x 1,..., x n ) Z p1 Z pn s.t.!x, k x i = x mod p i i }

40 Principle Property X C iff X < Π k. Π n = p 1 p n p 1 p 2... p k p k+1... p n Π k = p 1 p k Redundancy : r = n k

41 Principle Transmission Channel Computation

42 Principle Noisy Transmission Channel Unsecured Computation

43 Principle Noisy Transmission Channel Unsecured Computation Input A Encoding A = (A 1,... A n) Computation Solution x < M n x < M k x = (r 1,..., r n) Correction x = (x 1,..., x n) Decoding

44 Properties of the code Error model: Error: E = X X Error support: I = {i 1... n, E 0 mod p i } Impact of the error: Π F = i I p i

45 Properties of the code Error model: Error: E = X X Error support: I = {i 1... n, E 0 mod p i } Impact of the error: Π F = i I p i Detects up to r errors: If X = X + E with X C, #I r, X > Π k. Redundancy r = n k, distance: r + 1 can correct up to r 2 errors in theory More complicated in practice...

46 Correction i / I : E mod p i = 0 E is a multiple of Π V : E = Z Π V = Z i / I gcd(e, Π) = Π V Mandelbaum 78: rational reconstruction X = X E = X Z Π v X Π = X Π Z Π F X Π Z Π F 1 2Π 2 F Z Π F = E X Π is a convergent of Π rational reconstruction of X mod Π

47 Correction capacity Mandelbaum 78: 1 symbol = 1 residue Polynomial algorithm if e (n k) log p min log 2 log p max+log p min worst case: exponential (random perturbation) Goldreich Ron Sudan 99 weighted residues equivalent Guruswami Sahai Sudan 00 invariably polynomial time

48 Correction capacity Mandelbaum 78: 1 symbol = 1 residue Polynomial algorithm if e (n k) log p min log 2 log p max+log p min worst case: exponential (random perturbation) Goldreich Ron Sudan 99 weighted residues equivalent Guruswami Sahai Sudan 00 invariably polynomial time Interpretation: Errors have variable weights depending on their impact Π F = i I p i Example: X = 20, p 1 = 2, p 2 = 3, p 3 = error on X mod 2, or X mod 3, can be corrected but not on X mod 101

49 Plan Introduction High performance computing and cloud Related works on trusting the clouds Cloud computing and performance ABFT Redundant residue codes Homomorphic residue system Over Z: Mandelbaum algorithm Over K[X]: Reed Solomon point of view Generalization Adaptive approach First approach and the gap Experiments Early termination

50 Analogy with Reed Solomon Gao02 Reed-Solomon decoding by extended Euclidean Alg: Chinese Remaindering over K [X] p i = X a i Encoding = evaluation in a i Decoding = interpolation Correction = Extended Euclidean algorithm étendu

51 Analogy with Reed Solomon Gao02 Reed-Solomon decoding by extended Euclidean Alg: Chinese Remaindering over K [X] p i = X a i Encoding = evaluation in a i Decoding = interpolation Correction = Extended Euclidean algorithm étendu Generalization for p i of degrees > 1 Variable impact, depending on the degree of p i Necessary unification [Sudan 01,...]

52 Plan Introduction High performance computing and cloud Related works on trusting the clouds Cloud computing and performance ABFT Redundant residue codes Homomorphic residue system Over Z: Mandelbaum algorithm Over K[X]: Reed Solomon point of view Generalization Adaptive approach First approach and the gap Experiments Early termination

53 Generalized point of view: amplitude code Over a Euclidean ring A with a Euclidean function ν Distance : A A R + (x, y) i x y[p i ] log 2 ν (P i ) Definition (n,k) amplitude code C = {x A : ν(x) < κ}, n = log 2 Π, k = log 2 κ.

54 Generalized point of view: amplitude code Over a Euclidean ring A with a Euclidean function ν Distance : A A R + (x, y) i x y[p i ] log 2 ν (P i ) Definition (n,k) amplitude code C = {x A : ν(x) < κ}, n = log 2 Π, k = log 2 κ. Property (Quasi MDS) d > n k in general, and d n k + 1 over K [X]. correction rate = maximal amplitude of an error that can be corrected

55 Advantages Generalization over any Euclidean ring Natural representation of the amount of information No need to sort moduli Finer correction capacities

56 Advantages Generalization over any Euclidean ring Natural representation of the amount of information No need to sort moduli Finer correction capacities Adaptive decoding: taking advantage of all the available redundancy Early termination: with no a priori knowledge of a bound on the result

57 Interpretation of Mandelbaum s algorithm Remark Rational reconstruction Algorithm Partial Extended Euclidean Property The Extended Euclidean Algorithm, applied to (E, Π) and to (X = X + E, Π), performs the same first iterations until r i < Π V. u i 1 E + v i 1 Π = Π v u i E + v i Π = 0 u i 1 X + v i 1 Π = r i 1 u i X + v i Π = r i u i X = r i

58 Amplitude decoding, with static correction capacity Amplitude based decoder over R Data: Π, X Data: τ R + τ < ν(π) 2 : bound on the maximal error amplitude Result: X R: corrected message s.t. ν(x)4τ 2 ν(π) begin α 0 = 1, β 0 = 0, r 0 = Π; α 1 = 0, β 1 = 1, r 1 = X ; i = 1; while (ν(r i ) > ν(π)/2τ) do Let r i 1 = q i r i + r i+1 be the Euclidean division of r i 1 by r i ; α i+1 = α i 1 q i α i ; β i+1 = β i 1 q i β i ; i = i + 1; return X = r i β i end reaches the quasi-maximal correction capacity

59 reaches the quasi-maximal correction capacity requires a a priori knowledge of τ How to make the correction capacity adaptive? Amplitude decoding, with static correction capacity Amplitude based decoder over R Data: Π, X Data: τ R + τ < ν(π) 2 : bound on the maximal error amplitude Result: X R: corrected message s.t. ν(x)4τ 2 ν(π) begin α 0 = 1, β 0 = 0, r 0 = Π; α 1 = 0, β 1 = 1, r 1 = X ; i = 1; while (ν(r i ) > ν(π)/2τ) do Let r i 1 = q i r i + r i+1 be the Euclidean division of r i 1 by r i ; α i+1 = α i 1 q i α i ; β i+1 = β i 1 q i β i ; i = i + 1; return X = r i β i end

60 Adaptive approach Multiple goals: With a fixed n, the correction capacity depends on a bound on X pessimistic estimate how to take advantage of all the available redundancy? redondance effective utilisable X borne sur X redondance utilisee

61 Adaptive approach Multiple goals: With a fixed n, the correction capacity depends on a bound on X pessimistic estimate how to take advantage of all the available redundancy? redondance effective utilisable X borne sur X redondance utilisee Allow early termination: variable n and unknown bound

62 Plan Introduction High performance computing and cloud Related works on trusting the clouds Cloud computing and performance ABFT Redundant residue codes Homomorphic residue system Over Z: Mandelbaum algorithm Over K[X]: Reed Solomon point of view Generalization Adaptive approach First approach and the gap Experiments Early termination

63 A first adaptive approach Termination criterion in the Extended Euclidean alg.: α i+1 Π β i+1 E = 0 E = α i+1 Π/β i+1 test if β j divides Π check if X satisfies:ν(x) ν(π) 4ν(β j ) 2 But several candidates are possible discrimination by a post-condition on the result

64 A first adaptive approach Termination criterion in the Extended Euclidean alg.: α i+1 Π β i+1 E = 0 E = α i+1 Π/β i+1 test if β j divides Π check if X satisfies:ν(x) ν(π) 4ν(β j ) 2 But several candidates are possible discrimination by a post-condition on the result Example x = 23 with 0 error x = 2 with 1 error p i x i 2 3 2

65 Detecting a gap α i Π β i (X + E) = r i α i Π β i E = r i + β i X r i β i X

66 Detecting a gap α i Π β i (X + E) = r i α i Π β i E = r i + β i X r i β i X

67 Detecting a gap α i Π β i (X + E) = r i α i Π β i E = r i + β i X r i β i X

68 Detecting a gap α i Π β i (X + E) = r i α i Π β i E = r i + β i X r i β i X X = r i /β i At the final iteration: ν(r i ) ν(β i X) If necessary, a gap appears between r i 1 and r i.

69 Detecting a gap α i Π β i (X + E) = r i α i Π β i E = r i + β i X r i β i X 2 g X = r i /β i At the final iteration: ν(r i ) ν(β i X) If necessary, a gap appears between r i 1 and r i. Introduce a blank 2 g in order to detect a gap > 2 g

70 Detecting a gap α i Π β i (X + E) = r i α i Π β i E = r i + β i X r i β i X 2 g X = r i /β i At the final iteration: ν(r i ) ν(β i X) If necessary, a gap appears between r i 1 and r i. Introduce a blank 2 g in order to detect a gap > 2 g

71 Detecting a gap α i Π β i (X + E) = r i α i Π β i E = r i + β i X r i β i X 2 g X = r i /β i At the final iteration: ν(r i ) ν(β i X) If necessary, a gap appears between r i 1 and r i. Introduce a blank 2 g in order to detect a gap > 2 g

72 Detecting a gap α i Π β i (X + E) = r i α i Π β i E = r i + β i X r i β i X 2 g X = r i /β i At the final iteration: ν(r i ) ν(β i X) If necessary, a gap appears between r i 1 and r i. Introduce a blank 2 g in order to detect a gap > 2 g

73 Detecting a gap α i Π β i (X + E) = r i α i Π β i E = r i + β i X r i β i X 2 g X = r i /β i At the final iteration: ν(r i ) ν(β i X) If necessary, a gap appears between r i 1 and r i. Introduce a blank 2 g in order to detect a gap > 2 g Property Loss of correction capacity: very small in practice Test of the divisibility for the remaining candidates Strongly reduces the number of divisibility tests

74 Plan Introduction High performance computing and cloud Related works on trusting the clouds Cloud computing and performance ABFT Redundant residue codes Homomorphic residue system Over Z: Mandelbaum algorithm Over K[X]: Reed Solomon point of view Generalization Adaptive approach First approach and the gap Experiments Early termination

75 Experiments Size of the error g = 2 1/446 1/765 1/1118 2/1183 2/4165 1/7907 g = 3 1/244 1/414 1/576 2/1002 2/2164 1/4117 g = 5 1/53 1/97 1/153 2/262 1/575 1/1106 g = 10 1/1 1/3 1/9 1/14 1/26 1/35 g = 20 1/1 1/1 1/1 1/1 1/1 1/1 Table: Number of remaining candidates after the gap detection: c /d means d candidates with a gap > 2 g, and c of them passed the divisibility test. n 6001 (3000 moduli), κ 201 (100 moduli).

76 Experiments Divisibility Gap g=2 Gap g=5 Gap g=10 Threshold T= Time (s) Size of the errors Figure: Comparison for n (m = 1300 moduli of 20 bits), κ 6001 (300 moduli) and τ (about 500 moduli).

77 Experiments 5 Time (s) Gap g=5 Gap g=7 Gap g=10 Gap g=20 Threshold T= Size of the errors Figure: Comparison for n (m = moduli of 20 bits), κ (8500 moduli) and τ (500 moduli). Gap: Euclidean Algorithm down to the end overhead

78 Plan Introduction High performance computing and cloud Related works on trusting the clouds Cloud computing and performance ABFT Redundant residue codes Homomorphic residue system Over Z: Mandelbaum algorithm Over K[X]: Reed Solomon point of view Generalization Adaptive approach First approach and the gap Experiments Early termination

79 Early termination Input Output X Master Secured workers Fork tasks P2P workers Empty or X residues Certifier List of candidates Decoder Y CRT Lifter Figure: Fault tolerant distributed computation with early termination

80 Conclusion Residue systems : technology suited to cloud computing: parallelism, fault-tolerant, verification New metric for redundant residue codes: Unification with finer bounds on the correction capacities Enables adaptive decoding Adaptative decoding and early termination Gap method: limited overhead, better performances Framework for interactive computing with a cloud Perspective ABFT in exact linear algebra, determinant [LinBox] ABFT with (exact) floating point arithmetic Theoretical efficiency of the gap method, Generalization to adaptive list decoding [Sudan, Guruswami]

81 Jean-Louis Roch s References for this talk Majid Khonji, Clément Pernet, Jean-Louis Roch, Thomas Roche, and Thomas Stalinski. Output-sensitive decoding for redundant residue systems. In ISSAC 10: Proceedings of the 2010 International Symposium on Symbolic and Algebraic Computation, pages , New York, NY, USA, Jul ACM. Axel W. Krings, Jean-Louis Roch, Samir Jafar, and Séebastien Varrette. A Probabilistic Approach for Task and Result Certification of Large-scale Distributed Applications in Hostile Environments. In European Grid Conference EGC 2005 ( Amsterdam, The Netherlands, February Springer-Verlag, LNCS. Jean-Louis Roch and Sébastien Varrette. Probabilistic Certification of Divide & Conquer Algorithms on Global Computing Platforms. Application to Fault-Tolerant Exact Matrix-Vector Product. In Parallel Symbolic Computation 07 (PASCO 07), London, Ontario, Canada, July ACM. Thomas Roche, Jean-Louis Roch, and Matthieu Cunche. Algorithm-based fault tolerance applied to P2P computing networks. In The First International Conference on Advances in P2P Systems, pages , Sliema, Malta, Oct IEEE.

The Advantages and Disadvantages of Network Computing Nodes

The Advantages and Disadvantages of Network Computing Nodes Big Data & Scripting storage networks and distributed file systems 1, 2, in the remainder we use networks of computing nodes to enable computations on even larger datasets for a computation, each node

More information

How To Encrypt Data With A Power Of N On A K Disk

How To Encrypt Data With A Power Of N On A K Disk Towards High Security and Fault Tolerant Dispersed Storage System with Optimized Information Dispersal Algorithm I Hrishikesh Lahkar, II Manjunath C R I,II Jain University, School of Engineering and Technology,

More information

Notes 11: List Decoding Folded Reed-Solomon Codes

Notes 11: List Decoding Folded Reed-Solomon Codes Introduction to Coding Theory CMU: Spring 2010 Notes 11: List Decoding Folded Reed-Solomon Codes April 2010 Lecturer: Venkatesan Guruswami Scribe: Venkatesan Guruswami At the end of the previous notes,

More information

Bounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances

Bounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances Bounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances Jialin Zhang Tsinghua University zhanggl02@mails.tsinghua.edu.cn Wei Chen Microsoft Research Asia weic@microsoft.com Abstract

More information

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering

More information

Towards a compliance audit of SLAs for data replication in Cloud storage

Towards a compliance audit of SLAs for data replication in Cloud storage Towards a compliance audit of SLAs for data replication in Cloud storage J. Leneutre B. Djebaili, C. Kiennert, J. Leneutre, L. Chen, Data Integrity and Availability Verification Game in Untrusted Cloud

More information

Lecture 13 - Basic Number Theory.

Lecture 13 - Basic Number Theory. Lecture 13 - Basic Number Theory. Boaz Barak March 22, 2010 Divisibility and primes Unless mentioned otherwise throughout this lecture all numbers are non-negative integers. We say that A divides B, denoted

More information

Data Storage Security in Cloud Computing

Data Storage Security in Cloud Computing Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is

More information

THE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0

THE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0 THE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0 RICHARD J. MATHAR Abstract. We count solutions to the Ramanujan-Nagell equation 2 y +n = x 2 for fixed positive n. The computational

More information

Functional-Repair-by-Transfer Regenerating Codes

Functional-Repair-by-Transfer Regenerating Codes Functional-Repair-by-Transfer Regenerating Codes Kenneth W Shum and Yuchong Hu Abstract In a distributed storage system a data file is distributed to several storage nodes such that the original file can

More information

Primality Testing and Factorization Methods

Primality Testing and Factorization Methods Primality Testing and Factorization Methods Eli Howey May 27, 2014 Abstract Since the days of Euclid and Eratosthenes, mathematicians have taken a keen interest in finding the nontrivial factors of integers,

More information

U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra

U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009 Notes on Algebra These notes contain as little theory as possible, and most results are stated without proof. Any introductory

More information

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing. Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving

More information

Modélisation et résolutions numérique et symbolique

Modélisation et résolutions numérique et symbolique Modélisation et résolutions numérique et symbolique via les logiciels Maple et Matlab Jeremy Berthomieu Mohab Safey El Din Stef Graillat Mohab.Safey@lip6.fr Outline Previous course: partial review of what

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

Algorithm-Based Secure and Fault Tolerant Outsourcing of Matrix Computations

Algorithm-Based Secure and Fault Tolerant Outsourcing of Matrix Computations Algorithm-Based Secure and Fault Tolerant Outsourcing of Matrix Computations Amrit Kumar, Jean-Louis Roch To cite this version: Amrit Kumar, Jean-Louis Roch. Algorithm-Based Secure and Fault Tolerant Outsourcing

More information

Short Programs for functions on Curves

Short Programs for functions on Curves Short Programs for functions on Curves Victor S. Miller Exploratory Computer Science IBM, Thomas J. Watson Research Center Yorktown Heights, NY 10598 May 6, 1986 Abstract The problem of deducing a function

More information

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System

Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P vallimb@yahoo.com Mobile: 9866034900 2 R.Tamilkodi A.P tamil_kodiin@yahoo.co.in Mobile:

More information

Fault-Tolerant Computing

Fault-Tolerant Computing Fault-Tolerant Computing Software Design Methods Nov.. 2007 Algorithm Design Methods Slide 1 About This Presentation This presentation has been prepared for the graduate course ECE 257A (Fault-Tolerant

More information

Network Coding for Distributed Storage

Network Coding for Distributed Storage Network Coding for Distributed Storage Alex Dimakis USC Overview Motivation Data centers Mobile distributed storage for D2D Specific storage problems Fundamental tradeoff between repair communication and

More information

Cloud Data Storage Services Considering Public Audit for Security

Cloud Data Storage Services Considering Public Audit for Security Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Computing Cubic Fields in Quasi-Linear Time

Computing Cubic Fields in Quasi-Linear Time Computing Cubic Fields in Quasi-Linear Time K. Belabas Département de mathématiques (A2X) Université Bordeaux I 351, cours de la Libération, 33405 Talence (France) belabas@math.u-bordeaux.fr Cubic fields

More information

A Static Analyzer for Large Safety-Critical Software. Considered Programs and Semantics. Automatic Program Verification by Abstract Interpretation

A Static Analyzer for Large Safety-Critical Software. Considered Programs and Semantics. Automatic Program Verification by Abstract Interpretation PLDI 03 A Static Analyzer for Large Safety-Critical Software B. Blanchet, P. Cousot, R. Cousot, J. Feret L. Mauborgne, A. Miné, D. Monniaux,. Rival CNRS École normale supérieure École polytechnique Paris

More information

Remote Data Integrity Checking for Public Clouds

Remote Data Integrity Checking for Public Clouds IBM Student Workshop for Frontiers of Cloud Computing 01 Remote Data Integrity Checking for Public Clouds Bo (Irvine) Chen Department of Computer Science New Jersey Institute of Technology joint work with

More information

The Lattice Project: A Multi-Model Grid Computing System. Center for Bioinformatics and Computational Biology University of Maryland

The Lattice Project: A Multi-Model Grid Computing System. Center for Bioinformatics and Computational Biology University of Maryland The Lattice Project: A Multi-Model Grid Computing System Center for Bioinformatics and Computational Biology University of Maryland Parallel Computing PARALLEL COMPUTING a form of computation in which

More information

Offline sorting buffers on Line

Offline sorting buffers on Line Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: rkhandekar@gmail.com 2 IBM India Research Lab, New Delhi. email: pvinayak@in.ibm.com

More information

FAULT TOLERANCE FOR MULTIPROCESSOR SYSTEMS VIA TIME REDUNDANT TASK SCHEDULING

FAULT TOLERANCE FOR MULTIPROCESSOR SYSTEMS VIA TIME REDUNDANT TASK SCHEDULING FAULT TOLERANCE FOR MULTIPROCESSOR SYSTEMS VIA TIME REDUNDANT TASK SCHEDULING Hussain Al-Asaad and Alireza Sarvi Department of Electrical & Computer Engineering University of California Davis, CA, U.S.A.

More information

Signatures for Content Distribution with Network Coding

Signatures for Content Distribution with Network Coding Signatures for Content Distribution with Network Coding Fang Zhao, Ton Kalker, Muriel Médard, and Keesook J. Han Lab for Information and Decision Systems MIT, Cambridge, MA 02139, USA E-mail: zhaof/medard@mit.edu

More information

The van Hoeij Algorithm for Factoring Polynomials

The van Hoeij Algorithm for Factoring Polynomials The van Hoeij Algorithm for Factoring Polynomials Jürgen Klüners Abstract In this survey we report about a new algorithm for factoring polynomials due to Mark van Hoeij. The main idea is that the combinatorial

More information

Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

More information

Network File Storage with Graceful Performance Degradation

Network File Storage with Graceful Performance Degradation Network File Storage with Graceful Performance Degradation ANXIAO (ANDREW) JIANG California Institute of Technology and JEHOSHUA BRUCK California Institute of Technology A file storage scheme is proposed

More information

On the Placement of Management and Control Functionality in Software Defined Networks

On the Placement of Management and Control Functionality in Software Defined Networks On the Placement of Management and Control Functionality in Software Defined Networks D.Tuncer et al. Department of Electronic & Electrical Engineering University College London, UK ManSDN/NfV 13 November

More information

Parallel Computing. Benson Muite. benson.muite@ut.ee http://math.ut.ee/ benson. https://courses.cs.ut.ee/2014/paralleel/fall/main/homepage

Parallel Computing. Benson Muite. benson.muite@ut.ee http://math.ut.ee/ benson. https://courses.cs.ut.ee/2014/paralleel/fall/main/homepage Parallel Computing Benson Muite benson.muite@ut.ee http://math.ut.ee/ benson https://courses.cs.ut.ee/2014/paralleel/fall/main/homepage 3 November 2014 Hadoop, Review Hadoop Hadoop History Hadoop Framework

More information

RSA Attacks. By Abdulaziz Alrasheed and Fatima

RSA Attacks. By Abdulaziz Alrasheed and Fatima RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.

More information

Storage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann

Storage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Storage Systems Autumn 2009 Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Scaling RAID architectures Using traditional RAID architecture does not scale Adding news disk implies

More information

Middleware and Distributed Systems. System Models. Dr. Martin v. Löwis. Freitag, 14. Oktober 11

Middleware and Distributed Systems. System Models. Dr. Martin v. Löwis. Freitag, 14. Oktober 11 Middleware and Distributed Systems System Models Dr. Martin v. Löwis System Models (Coulouris et al.) Architectural models of distributed systems placement of parts and relationships between them e.g.

More information

7. Some irreducible polynomials

7. Some irreducible polynomials 7. Some irreducible polynomials 7.1 Irreducibles over a finite field 7.2 Worked examples Linear factors x α of a polynomial P (x) with coefficients in a field k correspond precisely to roots α k [1] of

More information

An Overview of Common Adversary Models

An Overview of Common Adversary Models An Overview of Common Adversary Karl Palmskog palmskog@kth.se 2012-03-29 Introduction Requirements of Software Systems 1 Functional Correctness: partial, termination, liveness, safety,... 2 Nonfunctional

More information

A simple and fast algorithm for computing exponentials of power series

A simple and fast algorithm for computing exponentials of power series A simple and fast algorithm for computing exponentials of power series Alin Bostan Algorithms Project, INRIA Paris-Rocquencourt 7815 Le Chesnay Cedex France and Éric Schost ORCCA and Computer Science Department,

More information

Lecture 9 - Message Authentication Codes

Lecture 9 - Message Authentication Codes Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,

More information

A Survey of Cloud Computing Guanfeng Octides

A Survey of Cloud Computing Guanfeng Octides A Survey of Cloud Computing Guanfeng Nov 7, 2010 Abstract The principal service provided by cloud computing is that underlying infrastructure, which often consists of compute resources like storage, processors,

More information

Lecture 4 Online and streaming algorithms for clustering

Lecture 4 Online and streaming algorithms for clustering CSE 291: Geometric algorithms Spring 2013 Lecture 4 Online and streaming algorithms for clustering 4.1 On-line k-clustering To the extent that clustering takes place in the brain, it happens in an on-line

More information

How Efficient can Memory Checking be?

How Efficient can Memory Checking be? How Efficient can Memory Checking be? Cynthia Dwork 1, Moni Naor 2,, Guy N. Rothblum 3,, and Vinod Vaikuntanathan 4, 1 Microsoft Research 2 The Weizmann Institute of Science 3 MIT 4 IBM Research Abstract.

More information

An Ecient Dynamic Load Balancing using the Dimension Exchange. Ju-wook Jang. of balancing load among processors, most of the realworld

An Ecient Dynamic Load Balancing using the Dimension Exchange. Ju-wook Jang. of balancing load among processors, most of the realworld An Ecient Dynamic Load Balancing using the Dimension Exchange Method for Balancing of Quantized Loads on Hypercube Multiprocessors * Hwakyung Rim Dept. of Computer Science Seoul Korea 11-74 ackyung@arqlab1.sogang.ac.kr

More information

Two Topics in Parametric Integration Applied to Stochastic Simulation in Industrial Engineering

Two Topics in Parametric Integration Applied to Stochastic Simulation in Industrial Engineering Two Topics in Parametric Integration Applied to Stochastic Simulation in Industrial Engineering Department of Industrial Engineering and Management Sciences Northwestern University September 15th, 2014

More information

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013

International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013 FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,

More information

Concrete Security of the Blum-Blum-Shub Pseudorandom Generator

Concrete Security of the Blum-Blum-Shub Pseudorandom Generator Appears in Cryptography and Coding: 10th IMA International Conference, Lecture Notes in Computer Science 3796 (2005) 355 375. Springer-Verlag. Concrete Security of the Blum-Blum-Shub Pseudorandom Generator

More information

Decentralized Utility-based Sensor Network Design

Decentralized Utility-based Sensor Network Design Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA narayans@cs.usc.edu, bkrishna@usc.edu

More information

Public Key Cryptography and RSA. Review: Number Theory Basics

Public Key Cryptography and RSA. Review: Number Theory Basics Public Key Cryptography and RSA Murat Kantarcioglu Based on Prof. Ninghui Li s Slides Review: Number Theory Basics Definition An integer n > 1 is called a prime number if its positive divisors are 1 and

More information

MTAT.07.003 Cryptology II. Digital Signatures. Sven Laur University of Tartu

MTAT.07.003 Cryptology II. Digital Signatures. Sven Laur University of Tartu MTAT.07.003 Cryptology II Digital Signatures Sven Laur University of Tartu Formal Syntax Digital signature scheme pk (sk, pk) Gen (m, s) (m,s) m M 0 s Sign sk (m) Ver pk (m, s)? = 1 To establish electronic

More information

Load Balancing. Load Balancing 1 / 24

Load Balancing. Load Balancing 1 / 24 Load Balancing Backtracking, branch & bound and alpha-beta pruning: how to assign work to idle processes without much communication? Additionally for alpha-beta pruning: implementing the young-brothers-wait

More information

Ensuring Data Storage Security in Cloud Computing

Ensuring Data Storage Security in Cloud Computing Ensuring Data Storage Security in Cloud Computing Cong Wang 1, Qian Wang 1, Kui Ren 1, and Wenjing Lou 2 1 ECE Department, Illinois Institute of Technology 2 ECE Department, Worcester Polytechnic Institute

More information

Faster deterministic integer factorisation

Faster deterministic integer factorisation David Harvey (joint work with Edgar Costa, NYU) University of New South Wales 25th October 2011 The obvious mathematical breakthrough would be the development of an easy way to factor large prime numbers

More information

Efficient Data Replication Scheme based on Hadoop Distributed File System

Efficient Data Replication Scheme based on Hadoop Distributed File System , pp. 177-186 http://dx.doi.org/10.14257/ijseia.2015.9.12.16 Efficient Data Replication Scheme based on Hadoop Distributed File System Jungha Lee 1, Jaehwa Chung 2 and Daewon Lee 3* 1 Division of Supercomputing,

More information

Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem

Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem Digital Signatures Murat Kantarcioglu Based on Prof. Li s Slides Digital Signatures: The Problem Consider the real-life example where a person pays by credit card and signs a bill; the seller verifies

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

Cost-Performance of Fault Tolerance in Cloud Computing

Cost-Performance of Fault Tolerance in Cloud Computing Cost-Performance of Fault Tolerance in Cloud Computing Y.M. Teo,2, B.L. Luong, Y. Song 2 and T. Nam 3 Department of Computer Science, National University of Singapore 2 Shanghai Advanced Research Institute,

More information

A Trust Evaluation Model for QoS Guarantee in Cloud Systems *

A Trust Evaluation Model for QoS Guarantee in Cloud Systems * A Trust Evaluation Model for QoS Guarantee in Cloud Systems * Hyukho Kim, Hana Lee, Woongsup Kim, Yangwoo Kim Dept. of Information and Communication Engineering, Dongguk University Seoul, 100-715, South

More information

A New Generic Digital Signature Algorithm

A New Generic Digital Signature Algorithm Groups Complex. Cryptol.? (????), 1 16 DOI 10.1515/GCC.????.??? de Gruyter???? A New Generic Digital Signature Algorithm Jennifer Seberry, Vinhbuu To and Dongvu Tonien Abstract. In this paper, we study

More information

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research MapReduce and Distributed Data Analysis Google Research 1 Dealing With Massive Data 2 2 Dealing With Massive Data Polynomial Memory Sublinear RAM Sketches External Memory Property Testing 3 3 Dealing With

More information

Building an energy dashboard. Energy measurement and visualization in current HPC systems

Building an energy dashboard. Energy measurement and visualization in current HPC systems Building an energy dashboard Energy measurement and visualization in current HPC systems Thomas Geenen 1/58 thomas.geenen@surfsara.nl SURFsara The Dutch national HPC center 2H 2014 > 1PFlop GPGPU accelerators

More information

IMPROVING PERFORMANCE OF RANDOMIZED SIGNATURE SORT USING HASHING AND BITWISE OPERATORS

IMPROVING PERFORMANCE OF RANDOMIZED SIGNATURE SORT USING HASHING AND BITWISE OPERATORS Volume 2, No. 3, March 2011 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info IMPROVING PERFORMANCE OF RANDOMIZED SIGNATURE SORT USING HASHING AND BITWISE

More information

Verifying Remote Data Integrity in Peer-to-Peer Data Storage: a Comprehensive Survey of Protocols

Verifying Remote Data Integrity in Peer-to-Peer Data Storage: a Comprehensive Survey of Protocols PPNA-251 1 Verifying Remote Integrity in Peer-to-Peer Storage: a Comprehensive Survey of Protocols Nouha Oualha *, Jean Leneutre and Yves Roudier * CEA, LIST Communicating Systems Laboratory Bât. 451 PC

More information

A Proposal for Authenticated Key Recovery System 1

A Proposal for Authenticated Key Recovery System 1 A Proposal for Authenticated Key Recovery System 1 Tsuyoshi Nishioka a, Kanta Matsuura a, Yuliang Zheng b,c, and Hideki Imai b a Information & Communication Business Div. ADVANCE Co., Ltd. 5-7 Nihombashi

More information

Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme

Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-3 E-ISSN: 2347-2693 Embedding more security in digital signature system by using combination of public

More information

Survey on Load Rebalancing for Distributed File System in Cloud

Survey on Load Rebalancing for Distributed File System in Cloud Survey on Load Rebalancing for Distributed File System in Cloud Prof. Pranalini S. Ketkar Ankita Bhimrao Patkure IT Department, DCOER, PG Scholar, Computer Department DCOER, Pune University Pune university

More information

Rethinking SIMD Vectorization for In-Memory Databases

Rethinking SIMD Vectorization for In-Memory Databases SIGMOD 215, Melbourne, Victoria, Australia Rethinking SIMD Vectorization for In-Memory Databases Orestis Polychroniou Columbia University Arun Raghavan Oracle Labs Kenneth A. Ross Columbia University Latest

More information

CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY

CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY January 10, 2010 CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY The set of polynomials over a field F is a ring, whose structure shares with the ring of integers many characteristics.

More information

Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching

Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching 2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction

More information

Comments on "public integrity auditing for dynamic data sharing with multi-user modification"

Comments on public integrity auditing for dynamic data sharing with multi-user modification University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers Faculty of Engineering and Information Sciences 2016 Comments on "public integrity auditing for dynamic

More information

Polarization codes and the rate of polarization

Polarization codes and the rate of polarization Polarization codes and the rate of polarization Erdal Arıkan, Emre Telatar Bilkent U., EPFL Sept 10, 2008 Channel Polarization Given a binary input DMC W, i.i.d. uniformly distributed inputs (X 1,...,

More information

Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and

Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and Breaking The Code Ryan Lowe Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and a minor in Applied Physics. As a sophomore, he took an independent study

More information

Victor Shoup Avi Rubin. fshoup,rubing@bellcore.com. Abstract

Victor Shoup Avi Rubin. fshoup,rubing@bellcore.com. Abstract Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,rubing@bellcore.com Abstract In this paper, we investigate a method by which smart

More information

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction

Enhancing Data Security in Cloud Storage Auditing With Key Abstraction Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,

More information

A new binary floating-point division algorithm and its software implementation on the ST231 processor

A new binary floating-point division algorithm and its software implementation on the ST231 processor 19th IEEE Symposium on Computer Arithmetic (ARITH 19) Portland, Oregon, USA, June 8-10, 2009 A new binary floating-point division algorithm and its software implementation on the ST231 processor Claude-Pierre

More information

Basic Algorithms In Computer Algebra

Basic Algorithms In Computer Algebra Basic Algorithms In Computer Algebra Kaiserslautern SS 2011 Prof. Dr. Wolfram Decker 2. Mai 2011 References Cohen, H.: A Course in Computational Algebraic Number Theory. Springer, 1993. Cox, D.; Little,

More information

Ressources management and runtime environments in the exascale computing era

Ressources management and runtime environments in the exascale computing era Ressources management and runtime environments in the exascale computing era Guillaume Huard MOAIS and MESCAL INRIA Projects CNRS LIG Laboratory Grenoble University, France Guillaume Huard MOAIS and MESCAL

More information

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication

Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG Sanju5878@gmail.com Bhupesh Kumar Dewangan Assistant Professor,CSE,

More information

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.

More information

RSA and Primality Testing

RSA and Primality Testing and Primality Testing Joan Boyar, IMADA, University of Southern Denmark Studieretningsprojekter 2010 1 / 81 Correctness of cryptography cryptography Introduction to number theory Correctness of with 2

More information

A Robust and Secure Overlay Storage Scheme Based on Erasure Coding

A Robust and Secure Overlay Storage Scheme Based on Erasure Coding A Robust and Secure Overlay Storage Scheme Based on Erasure Coding Chuanyou Li Yun Wang School of Computer Science and Engineering, Southeast University Key Lab of Computer Network and Information Integration,

More information

Journal of Theoretical and Applied Information Technology 20 th July 2015. Vol.77. No.2 2005-2015 JATIT & LLS. All rights reserved.

Journal of Theoretical and Applied Information Technology 20 th July 2015. Vol.77. No.2 2005-2015 JATIT & LLS. All rights reserved. EFFICIENT LOAD BALANCING USING ANT COLONY OPTIMIZATION MOHAMMAD H. NADIMI-SHAHRAKI, ELNAZ SHAFIGH FARD, FARAMARZ SAFI Department of Computer Engineering, Najafabad branch, Islamic Azad University, Najafabad,

More information

From Factorial Designs to Hilbert Schemes

From Factorial Designs to Hilbert Schemes From Factorial Designs to Hilbert Schemes Lorenzo Robbiano Università di Genova Dipartimento di Matematica Lorenzo Robbiano (Università di Genova) Factorial Designs and Hilbert Schemes Genova, June 2015

More information

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem

More information

Write a technical report Present your results Write a workshop/conference paper (optional) Could be a real system, simulation and/or theoretical

Write a technical report Present your results Write a workshop/conference paper (optional) Could be a real system, simulation and/or theoretical Identify a problem Review approaches to the problem Propose a novel approach to the problem Define, design, prototype an implementation to evaluate your approach Could be a real system, simulation and/or

More information

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction

Index Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction Real-Time Service Composition and Deployment for Secure Computing in Cloud Environment R. Ushadevi 1, V. Rajamani 2 1 Research Scholar, Department of Computer Applications, St. Peter s University, Chennai

More information

A Novel Approach to combine Public-key encryption with Symmetric-key encryption

A Novel Approach to combine Public-key encryption with Symmetric-key encryption Volume 1, No. 4, June 2012 ISSN 2278-1080 The International Journal of Computer Science & Applications (TIJCSA) RESEARCH PAPER Available Online at http://www.journalofcomputerscience.com/ A Novel Approach

More information

How To Balance In Cloud Computing

How To Balance In Cloud Computing A Review on Load Balancing Algorithms in Cloud Hareesh M J Dept. of CSE, RSET, Kochi hareeshmjoseph@ gmail.com John P Martin Dept. of CSE, RSET, Kochi johnpm12@gmail.com Yedhu Sastri Dept. of IT, RSET,

More information

ATheoryofComplexity,Conditionand Roundoff

ATheoryofComplexity,Conditionand Roundoff ATheoryofComplexity,Conditionand Roundoff Felipe Cucker Berkeley 2014 Background L. Blum, M. Shub, and S. Smale [1989] On a theory of computation and complexity over the real numbers: NP-completeness,

More information

Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range

Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range THEORY OF COMPUTING, Volume 1 (2005), pp. 37 46 http://theoryofcomputing.org Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range Andris Ambainis

More information

Dimensioning an inbound call center using constraint programming

Dimensioning an inbound call center using constraint programming Dimensioning an inbound call center using constraint programming Cyril Canon 1,2, Jean-Charles Billaut 2, and Jean-Louis Bouquard 2 1 Vitalicom, 643 avenue du grain d or, 41350 Vineuil, France ccanon@fr.snt.com

More information

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms

More information

Dynamic Resource Pricing on Federated Clouds

Dynamic Resource Pricing on Federated Clouds Dynamic Resource Pricing on Federated Clouds Marian Mihailescu and Yong Meng Teo Department of Computer Science National University of Singapore Computing 1, 13 Computing Drive, Singapore 117417 Email:

More information

Speeding Up RSA Encryption Using GPU Parallelization

Speeding Up RSA Encryption Using GPU Parallelization 2014 Fifth International Conference on Intelligent Systems, Modelling and Simulation Speeding Up RSA Encryption Using GPU Parallelization Chu-Hsing Lin, Jung-Chun Liu, and Cheng-Chieh Li Department of

More information

A Real-Time Primary-Backup Replication Service

A Real-Time Primary-Backup Replication Service IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 10, NO. 6, JUNE 1999 533 A Real-Time Primary-Backup Replication Service Hengming Zou, Student Member, IEEE, and Farnam Jahanian, Member, IEEE

More information

A Practical Approach of Storage Strategy for Grid Computing Environment

A Practical Approach of Storage Strategy for Grid Computing Environment A Practical Approach of Storage Strategy for Grid Computing Environment Kalim Qureshi Abstract -- An efficient and reliable fault tolerance protocol plays an important role in making the system more stable.

More information

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering

More information

Dynamic Load Balancing in a Network of Workstations

Dynamic Load Balancing in a Network of Workstations Dynamic Load Balancing in a Network of Workstations 95.515F Research Report By: Shahzad Malik (219762) November 29, 2000 Table of Contents 1 Introduction 3 2 Load Balancing 4 2.1 Static Load Balancing

More information

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash

More information

= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that

= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that Instructions. Answer each of the questions on your own paper, and be sure to show your work so that partial credit can be adequately assessed. Credit will not be given for answers (even correct ones) without

More information