TrInc: Small Trusted Hardware for Large Distributed Systems. Levin, D., Douceur, J., R., Lorch, J., R., & Moscibroda, T. In Proceedings of USENIX Symposium on Networked Systems Design and Implementation (NSDI), 4, 2009. USENIX.
Website abstract bibtex A simple yet remarkably powerful tool of selfish and malicious participants in a distributed system is ” equivocation”: making conflicting statements to others. We present TrInc, a small, trusted component that combats equivocation in large, distributed systems. Consisting fundamentally of only a non-decreasing counter and a key, TrInc provides a new primitive: unique, once-in-a-lifetime attestations.
\par
We show that TrInc is practical, versatile, and easily applicable to a wide range of distributed systems. Its deployment is viable because it is simple and because its fundamental components—a trusted counter and a key—are already deployed in many new personal computers today. We demonstrate TrInc's versatility with three detailed case studies: attested append-only memory (A2M), PeerReview, and BitTorrent.
\par
We have implemented TrInc and our three case studies using real, currently available trusted hardware. Our evaluation shows that TrInc eliminates most of the trusted storage needed to implement A2M, significantly reduces communication overhead in PeerReview, and solves an open incentives issue in BitTorrent. Microbenchmarks of our TrInc implementation indicate directions for the design of future trusted hardware.
@inProceedings{
title = {TrInc: Small Trusted Hardware for Large Distributed Systems},
type = {inProceedings},
year = {2009},
keywords = {fixnot-doi,trust},
websites = {http://www.usenix.org/events/nsdi09/tech/full_papers/levin/levin.pdf},
month = {4},
publisher = {USENIX},
id = {9bb41a3f-5558-3e78-893e-290c921c556a},
created = {2018-07-12T21:31:35.827Z},
file_attached = {false},
profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
last_modified = {2018-07-12T21:31:35.827Z},
read = {false},
starred = {false},
authored = {false},
confirmed = {true},
hidden = {false},
citation_key = {levin:trinc},
source_type = {inproceedings},
private_publication = {false},
abstract = {A simple yet remarkably powerful tool of selfish and malicious participants in a distributed system is ” equivocation”: making conflicting statements to others. We present TrInc, a small, trusted component that combats equivocation in large, distributed systems. Consisting fundamentally of only a non-decreasing counter and a key, TrInc provides a new primitive: unique, once-in-a-lifetime attestations.
\par
We show that TrInc is practical, versatile, and easily applicable to a wide range of distributed systems. Its deployment is viable because it is simple and because its fundamental components—a trusted counter and a key—are already deployed in many new personal computers today. We demonstrate TrInc's versatility with three detailed case studies: attested append-only memory (A2M), PeerReview, and BitTorrent.
\par
We have implemented TrInc and our three case studies using real, currently available trusted hardware. Our evaluation shows that TrInc eliminates most of the trusted storage needed to implement A2M, significantly reduces communication overhead in PeerReview, and solves an open incentives issue in BitTorrent. Microbenchmarks of our TrInc implementation indicate directions for the design of future trusted hardware.},
bibtype = {inProceedings},
author = {Levin, Dave and Douceur, John R and Lorch, Jacob R and Moscibroda, Thomas},
booktitle = {Proceedings of USENIX Symposium on Networked Systems Design and Implementation (NSDI)}
}
Downloads: 0
{"_id":"u8puoHkkfhS6P66tr","bibbaseid":"levin-douceur-lorch-moscibroda-trincsmalltrustedhardwareforlargedistributedsystems-2009","downloads":0,"creationDate":"2019-02-15T15:14:59.442Z","title":"TrInc: Small Trusted Hardware for Large Distributed Systems","author_short":["Levin, D.","Douceur, J., R.","Lorch, J., R.","Moscibroda, T."],"year":2009,"bibtype":"inProceedings","biburl":null,"bibdata":{"title":"TrInc: Small Trusted Hardware for Large Distributed Systems","type":"inProceedings","year":"2009","keywords":"fixnot-doi,trust","websites":"http://www.usenix.org/events/nsdi09/tech/full_papers/levin/levin.pdf","month":"4","publisher":"USENIX","id":"9bb41a3f-5558-3e78-893e-290c921c556a","created":"2018-07-12T21:31:35.827Z","file_attached":false,"profile_id":"f954d000-ce94-3da6-bd26-b983145a920f","group_id":"b0b145a3-980e-3ad7-a16f-c93918c606ed","last_modified":"2018-07-12T21:31:35.827Z","read":false,"starred":false,"authored":false,"confirmed":"true","hidden":false,"citation_key":"levin:trinc","source_type":"inproceedings","private_publication":false,"abstract":"A simple yet remarkably powerful tool of selfish and malicious participants in a distributed system is ” equivocation”: making conflicting statements to others. We present TrInc, a small, trusted component that combats equivocation in large, distributed systems. Consisting fundamentally of only a non-decreasing counter and a key, TrInc provides a new primitive: unique, once-in-a-lifetime attestations.\n\\par\nWe show that TrInc is practical, versatile, and easily applicable to a wide range of distributed systems. Its deployment is viable because it is simple and because its fundamental components—a trusted counter and a key—are already deployed in many new personal computers today. We demonstrate TrInc's versatility with three detailed case studies: attested append-only memory (A2M), PeerReview, and BitTorrent.\n\\par\nWe have implemented TrInc and our three case studies using real, currently available trusted hardware. Our evaluation shows that TrInc eliminates most of the trusted storage needed to implement A2M, significantly reduces communication overhead in PeerReview, and solves an open incentives issue in BitTorrent. Microbenchmarks of our TrInc implementation indicate directions for the design of future trusted hardware.","bibtype":"inProceedings","author":"Levin, Dave and Douceur, John R and Lorch, Jacob R and Moscibroda, Thomas","booktitle":"Proceedings of USENIX Symposium on Networked Systems Design and Implementation (NSDI)","bibtex":"@inProceedings{\n title = {TrInc: Small Trusted Hardware for Large Distributed Systems},\n type = {inProceedings},\n year = {2009},\n keywords = {fixnot-doi,trust},\n websites = {http://www.usenix.org/events/nsdi09/tech/full_papers/levin/levin.pdf},\n month = {4},\n publisher = {USENIX},\n id = {9bb41a3f-5558-3e78-893e-290c921c556a},\n created = {2018-07-12T21:31:35.827Z},\n file_attached = {false},\n profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},\n group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},\n last_modified = {2018-07-12T21:31:35.827Z},\n read = {false},\n starred = {false},\n authored = {false},\n confirmed = {true},\n hidden = {false},\n citation_key = {levin:trinc},\n source_type = {inproceedings},\n private_publication = {false},\n abstract = {A simple yet remarkably powerful tool of selfish and malicious participants in a distributed system is ” equivocation”: making conflicting statements to others. We present TrInc, a small, trusted component that combats equivocation in large, distributed systems. Consisting fundamentally of only a non-decreasing counter and a key, TrInc provides a new primitive: unique, once-in-a-lifetime attestations.\n\\par\nWe show that TrInc is practical, versatile, and easily applicable to a wide range of distributed systems. Its deployment is viable because it is simple and because its fundamental components—a trusted counter and a key—are already deployed in many new personal computers today. We demonstrate TrInc's versatility with three detailed case studies: attested append-only memory (A2M), PeerReview, and BitTorrent.\n\\par\nWe have implemented TrInc and our three case studies using real, currently available trusted hardware. Our evaluation shows that TrInc eliminates most of the trusted storage needed to implement A2M, significantly reduces communication overhead in PeerReview, and solves an open incentives issue in BitTorrent. Microbenchmarks of our TrInc implementation indicate directions for the design of future trusted hardware.},\n bibtype = {inProceedings},\n author = {Levin, Dave and Douceur, John R and Lorch, Jacob R and Moscibroda, Thomas},\n booktitle = {Proceedings of USENIX Symposium on Networked Systems Design and Implementation (NSDI)}\n}","author_short":["Levin, D.","Douceur, J., R.","Lorch, J., R.","Moscibroda, T."],"urls":{"Website":"http://www.usenix.org/events/nsdi09/tech/full_papers/levin/levin.pdf"},"bibbaseid":"levin-douceur-lorch-moscibroda-trincsmalltrustedhardwareforlargedistributedsystems-2009","role":"author","keyword":["fixnot-doi","trust"],"downloads":0},"search_terms":["trinc","small","trusted","hardware","large","distributed","systems","levin","douceur","lorch","moscibroda"],"keywords":["fixnot-doi","trust"],"authorIDs":[]}