(Press-News.org) CAMBRIDGE, Mass-- For small and midsize organizations, the outsourcing of demanding computational tasks to the cloud — huge banks of computers accessible over the Internet — can be much more cost-effective than buying their own hardware. But it also poses a security risk: A malicious hacker could rent space on a cloud server and use it to launch programs that hijack legitimate applications, interfering with their execution.
In August, at the International Cryptology Conference, researchers from MIT and Israel's Technion and Tel Aviv University presented a new system that can quickly verify that a program running on the cloud is executing properly. That amounts to a guarantee that no malicious code is interfering with the program's execution.
The same system also protects the data used by applications running in the cloud, cryptographically ensuring that the user won't learn anything other than the immediate results of the requested computation. If, for instance, hospitals were pooling medical data in a huge database hosted on the cloud, researchers could look for patterns in the data without compromising patient privacy.
Although the paper reports new theoretical results, the researchers have also built working code that implements their system. At present, it works only with programs written in the C programming language, but adapting it to other languages should be straightforward.
The new work, like much current research on secure computation, requires that computer programs be represented as circuits. So the researchers' system includes a "circuit generator" that automatically converts C code to circuit diagrams. The circuits it produces, however, are much smaller than those produced by its predecessors, so by itself, the circuit generator may find other applications in cryptography.
Zero knowledge
Alessandro Chiesa, a graduate student in electrical engineering and computer science at MIT and one of the paper's authors, says that because the new system protects both the integrity of programs running in the cloud and the data they use, it's a good complement to the cryptographic technique known as homomorphic encryption, which protects the data transmitted by the users of cloud applications.
Joining Chiesa on the paper are Madars Virza, also a graduate student in electrical engineering and computer science; the Technion's Daniel Genkin and Eli Ben-Sasson, who was a visiting professor at MIT for the past two years; and Tel Aviv University's Eran Tromer, who was a postdoc at MIT. The researchers' system implements a so-called zero-knowledge proof, a type of mathematical game invented by MIT professors Shafi Goldwasser and Silvio Micali and their colleague Charles Rackoff of the University of Toronto. In its cryptographic application, a zero-knowledge proof enables one of the game's players to prove to the other that he or she knows a secret key without actually divulging it.
But as its name implies, a zero-knowledge proof is a more general method for proving mathematical theorems — and the correct execution of a computer program can be redescribed as a theorem. So zero-knowledge proofs are by definition able to establish whether or not a computer program is executing correctly.
The problem is that existing implementations of zero-knowledge proofs — except in cases where they've been tailored to particular algorithms — take as long to execute as the programs they're trying to verify. That's fine for password verification, but not for a computation substantial enough that it might be farmed out to the cloud.
The researchers' innovation is a practical, succinct zero-knowledge proof for arbitrary programs. Indeed, it's so succinct that it can typically fit in a single data packet.
Linear thinking
As Chiesa explains, his and his colleagues' approach depends on a variation of what's known as a "probabilistically checkable proof," or PCP. "With a standard mathematical proof, if you want to verify it, you have to go line by line from the start to the end," Chiesa says. "If you were to skip one line, potentially, that could fool you. Traditional proofs are very fragile in this respect." "The PCP theorem says that there is a way to rewrite proofs so that instead of reading them line by line," Chiesa adds, "what you can do is flip a few coins and probabilistically sample three or four lines and have a probabilistic guarantee that it's correct."
The problem, Virza says, is that "the current known constructions of the PCP theorem, though great in theory, have quite bad practical realizations." That's because the theory assumes that an adversary who's trying to produce a fraudulent proof has unbounded computational capacity. What Chiesa, Virza and their colleagues do instead is assume that the adversary is capable only of performing simple linear operations.
"This assumption is, of course, false in practice," Virza says. "So we use a cryptographic encoding to force the adversary to only linear evaluations. There is a way to encode numbers into such a form that you can add those numbers, but you can't do anything else. This is how we sidestep the inefficiencies of the PCP theorem."
###
Written by Larry Hardesty, MIT News Office
New system allows cloud customers to detect program-tampering
A new version of 'zero-knowledge proofs' allows cloud customers to verify the proper execution of their software with a single packet of data
2013-09-11
ELSE PRESS RELEASES FROM THIS DATE:
Development of a new program that simulates protein movements
2013-09-11
This news release is available in Spanish and Spanish.
Proteins are molecules involved in most of the biological processes that take place in our bodies. They have to move in order to fulfil many of their functions. For example, they open or close to keep and transport the molecules inside them. Until now, costly methods were the only available option for studying these movements: supercomputers were needed and the calculations took many days. The department of mechanics of the Faculty of Engineering in Bilbao has now developed a shorter method. On the basis of ...
'Merlin' is a matchmaker, not a magician
2013-09-11
Johns Hopkins researchers have figured out the specific job of a protein long implicated in tumors of the nervous system. Reporting on a new study described in the Sept. 12 issue of the journal Cell, they detail what they call the "matchmaking" activities of a fruit fly protein called Merlin, whose human counterpart, NF2, is a tumor suppressor protein known to cause neurofibromatosis type II when mutated.
Merlin (which stands for Moesin-Ezrin-Radixin-Like Protein) was already known to influence the function of another protein, dubbed Hippo, but the particulars of that ...
Fires in Argentina Sept. 11, 2013
2013-09-11
Wildfires have broken out in four provinces in Argentina including forest land in Cordoba. The high temperatures and gusty winds have wreaked havoc on the growth of these wildfires and the local meteorologists predict more of the same conditions in the coming days.
According to the Miami Herald: "Cordoba Social Development Minister Daniel Passerini said Tuesday that firefighters are having the toughest time in the central province (near Cordoba) with flames fanned by wind gusts and high temperatures. Passerini says the blaze in Cordoba province has caused the evacuation ...
NASA 3-D image clearly shows wind shear's effect on Tropical Storm Gabrielle
2013-09-11
Data obtained from NASA's TRMM satellite was used to create a 3-D image of Tropical Storm Gabrielle's rainfall that clearly showed wind shear pushed all of the storm's the rainfall east of its center.
NASA's Tropical Rainfall Measuring Mission satellite known as "TRMM" flew directly above tropical Storm Gabrielle on September 10, 2013 at 2124 UTC (5:24 p.m. EDT) as the storm approached Bermuda. TRMM's Precipitation Radar (PR) data found that rain was falling at a rate of over 127mm/~5 inches per hour in a line of intense storms southeast of Bermuda. TRMM PR also found ...
Rim Fire update Sept. 11, 2013
2013-09-11
Firefighters faced extremely hot and dry conditions which contributed to more active fire activity with isolated flare-ups inside current containment lines. The fire is active in the Clavey River Reynolds Creek and Jawbone Creek drainages as well as to the west of Harden Lake, Harden Road and Tioga Road. Moderate fire spread to the northeast into Yosemite Wilderness areas north of Hetch Hetchy reservoir is expected. Unburned tinder within and adjacent to the fire perimeter continue to consume and create spotting near or across planned containment lines. As such the percent ...
International study provides new genetic clue to anorexia
2013-09-11
LA JOLLA, CA—September 11, 2013—The largest DNA-sequencing study of anorexia nervosa has linked the eating disorder to variants in a gene coding for an enzyme that regulates cholesterol metabolism. The finding suggests that anorexia could be caused in part by a disruption in the normal processing of cholesterol, which may disrupt mood and eating behavior.
"These findings point in a direction that probably no one would have considered taking before," said Nicholas J. Schork, a professor at The Scripps Research Institute (TSRI). Schork was the senior investigator for the ...
Trauma centers serving mostly white patients have lower death rates for patients of all races
2013-09-11
Nearly 80 percent of trauma centers in the United States that serve predominantly minority patients have higher-than-expected death rates, according to new Johns Hopkins research. Moreover, the research shows, trauma patients of all races are 40 percent less likely to die — regardless of the severity of their injuries — if they are treated at hospitals with lower-than-expected mortality rates, the vast majority of which serve predominantly white patients.
The findings, described in an article published in the October issue of Annals of Surgery, offer confirmation and ...
Radiotherapy in girls and the risk of breast cancer later in life
2013-09-11
Exposing young women and girls under the age of 20 to ionizing radiation can substantially raise the risk of their developing breast cancer later in life. Scientists may now know why. A collaborative study, in which Berkeley Lab researchers played a pivotal role, points to increased stem cell self-renewal and subsequent mammary stem cell enrichment as the culprits. Breasts enriched with mammary stem cells as a result of ionizing irradiation during puberty show a later-in-life propensity for developing ER negative tumors - cells that do not have the estrogen receptor. Estrogen ...
Low dose antibiotic treatment of C-difficile as effective as high dose in hospital setting
2013-09-11
NEW YORK (September 11, 2013) – Clostridium difficile infection (CDI) treatment in a hospital setting using low dose oral vancomycin showed similar effectiveness compared to high dose, according to a new study by researchers at Montefiore Medical Center and Albert Einstein College of Medicine of Yeshiva University. These data were presented yesterday at the 53rd Annual Interscience Conference on Antimicrobial Agents and Chemotherapy meeting in Denver.
Patients with CDI treated with vancomycin at the low dose (LD) (125 mg every 6 hours) and high dose (HD) (greater than ...
Brachytherapy to treat cervical cancer declines in US, treatment associated with higher survival
2013-09-11
Boston, MA – A study by researchers at Brigham and Women's Hospital (BWH) found that brachytherapy treatment was associated with better cause-specific survival and overall survival in women with cervical cancer. The population-based analysis also revealed geographic disparities and decline in brachytherapy treatment in the United States. Brachytherapy is a type of cancer treatment in which radioactive implants are inserted directly into the tissue near the tumor site.
The study is published in the September 2013 issue of The International Journal of Radiation Oncology.
The ...
LAST 30 PRESS RELEASES:
Less intensive works best for agricultural soil
Arctic rivers project receives “national champion” designation from frontiers foundation
Computational biology paves the way for new ALS tests
Study offers new hope for babies born with opioid withdrawal syndrome
UT, Volkswagen Group of America celebrate research partnership
New Medicare program could dramatically improve affordability for cancer drugs – if patients enroll
Are ‘zombie’ skin cells harmful or helpful? The answer may be in their shapes
University of Cincinnati Cancer Center presents research at AACR 2025
Head and neck, breast, lung and survivorship studies headline Dana-Farber research at AACR Annual Meeting 2025
AACR: Researchers share promising results from MD Anderson clinical trials
New research explains why our waistlines expand in middle age
Advancements in muon detection: Taishan Antineutrino Observatory's innovative top veto tracker
Chips off the old block
Microvascular decompression combined with nerve combing for atypical trigeminal neuralgia
Cutting the complexity from digital carpentry
Lung immune cell type “quietly” controls inflammation in COVID-19
Fiscal impact of expanded Medicare coverage for GLP-1 receptor agonists to treat obesity
State and sociodemographic trends in US cigarette smoking with future projections
Young adults drive historic decline in smoking
NFCR congratulates Dr. Robert C. Bast, Jr. on receiving the AACR-Daniel D. Von Hoff Award for Outstanding Contributions to Education and Training in Cancer Research
Chimpanzee stem cells offer new insights into early embryonic development
This injected protein-like polymer helps tissues heal after a heart attack
FlexTech inaugural issue launches, pioneering interdisciplinary innovation in flexible technology
In Down syndrome mice, 40Hz light and sound improve cognition, neurogenesis, connectivity
Methyl eugenol: potential to inhibit oxidative stress, address related diseases, and its toxicological effects
A vascularized multilayer chip reveals shear stress-induced angiogenesis in diverse fluid conditions
AI helps unravel a cause of Alzheimer's disease and identify a therapeutic candidate
Coalition of Autism Scientists critiques US Department of Health and Human Services Autism Research Initiative
Structure dictates effectiveness, safety in nanomedicine
Mission accomplished for the “T2T” Hong Kong Bauhinia Genome Project
[Press-News.org] New system allows cloud customers to detect program-tamperingA new version of 'zero-knowledge proofs' allows cloud customers to verify the proper execution of their software with a single packet of data