OVERSEE: Outsourcing Verification to Enable Resource Sharing in Edge - - PowerPoint PPT Presentation

oversee outsourcing verification to enable resource
SMART_READER_LITE
LIVE PREVIEW

OVERSEE: Outsourcing Verification to Enable Resource Sharing in Edge - - PowerPoint PPT Presentation

OVERSEE: Outsourcing Verification to Enable Resource Sharing in Edge Environment Reporter: Xiaoqing Cai August 2020 From Cloud to Edge Cloud Computing Edge Computing Low Latency Lack of Resources Cloud Computing Edge Computing No More


slide-1
SLIDE 1

OVERSEE: Outsourcing Verification to Enable Resource Sharing in Edge Environment Reporter: Xiaoqing Cai August 2020

slide-2
SLIDE 2

From Cloud to Edge

Cloud Computing Edge Computing Low Latency

slide-3
SLIDE 3

Lack of Resources

Cloud Computing Edge Computing

No More Edge

slide-4
SLIDE 4

Multi-tenant Data Center

Tenant A Tenant B Tenant C

100 200 300 1 3 5 7 9 11 100 200 300 1 3 5 7 9 11 100 200 300 1 3 5 7 9 11

No Simultaneous Peak

Task Outsourcing

Lessee Lessor

slide-5
SLIDE 5

Two Basic Properties for Task Outsourcing

The outsourced task can be executed correctly, i.e., completely and without modification

Unaware

blame blame If User receives wrong results May Bad Innocent Outso- urcing Traditi-

  • nal

Performance Reliability

Verify that the lessor provides sufficient resources to meet the QoS requirement according to the lease agreement between the data center tenants Save power to make profit Not enough resources Untrusted QoS information

slide-6
SLIDE 6

OVERSEE

O V E R S E E

Reliability Report-Proof Mechanism Performance Sampling-Challenging Mechanism

Enclave

Report

Enclave

Proof

After Initialization After Execution

Insert sampling code Sends sampling requests

… …

slide-7
SLIDE 7

What is SGX

Software Guard eXtension is a set of instructions that provide protected memory access control to Intel architectures.

Create OS Enclave Enclave DRAM APP Enclave Local/Remote attestation

Local / Remote Execution

Enclave

compare load

true e ❶ ❷ ❸

measure

slide-8
SLIDE 8

Report-Proof Mechanism

  • I. Redundant calculation

◆ Verify the correctness

  • f the task results

◆ Verify the execution process Reliability

  • II. Non-deterministic results
  • r
  • I. Exploit TEE provided by

Intel SGX

Enclave

  • II. Can not guarantee the

completeness of task execution Ring 3

Enclave

Ring 0…

Report

slide-9
SLIDE 9

Report-Proof Mechanism

Code Data Enclave private public ❶ ❷ Initialize the enclave Generate a pair of private key(SK) and public key(PK) ❸ ❹ ❺

PK Report

CPU Signature

Insert PK in the report and sign with CPU Execute the task and sampling codes Proof

Task Result Hash Sample Array

Private key Signature

Sign the proof with SK …

slide-10
SLIDE 10

Sampling-Challenging Mechanism

Performance——Why not just a monitor process ?

Untrusted Part

(operating system)

Trusted Part

(enclave program) Call Gate CallTrusted

Process1

(task running)

Process2

(QoS monitoring)

1st OCALL nth OCALL ...... Ith OCALL completed

Return

1stSystemCall

(Generate log)

IthSystemCall

(Generate log)

nthSystemCall

(Generate log)

file

Trusted?

Save state Return Save state Return Save state Return

......

(The external calling mechanism of SGX)

slide-11
SLIDE 11

Sampling-Challenging Mechanism

Performance——Sampling-Challenging Mechanism

Trusted Part

(enclave program) Call Gate CallTrusted

Process1 1st sample nth sample ...... Ith sample completed

Return

......

(task running) (sampling-codes) random sample parameter

Proof

Task Result Hash Sample Array

Private key Signature

Generate

Report

Generate

slide-12
SLIDE 12

Sampling-Challenging Mechanism

Lessee Lessor Enclave Send sampling codes Return execution time Satisfy the requirement? Enclave Send the outsourcing task with inserted sampling codes If yes, make the lease agreement

Report Proof

Return results and certificates compare

Proof

slide-13
SLIDE 13

Sampling-Challenging Mechanism

  • Problem Definition

𝒃𝟐 𝒃𝟑 𝒃𝟒

𝒃𝒋 𝒄𝟐 𝒄𝟑 𝒄𝟒 𝒄𝟓 𝒄𝒌

(a) T

𝒃𝒋 𝒄𝒌

(b)

𝒃𝒋

(c)

𝒄𝒌

Determine the probability that the cheat can be detected given the sampling time, cheating time and the actual execution time of the outsourced task.

  • Sampling Model
slide-14
SLIDE 14

Sampling-Challenging Mechanism

  • Theorem
slide-15
SLIDE 15

Evaluation

Probability of Detecting QoS Degradation

slide-16
SLIDE 16

Evaluation

Computational Overhead Environment:

  • A single machine with 16GB DDR4 RAM and Intel Core i7-9750H 2.6GHz

with 6 hyper-threaded cores

  • 𝜌 calculation, Bubble Sort and Floyd
slide-17
SLIDE 17

Thank You!