2015
DOI: 10.1016/j.future.2015.02.004
|View full text |Cite
|
Sign up to set email alerts
|

AntiCheetah: Trustworthy computing in an outsourced (cheating) environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 40 publications
0
4
0
Order By: Relevance
“…Re-execution can be implemented in several ways. In [10], the authors propose outsourcing computation to multiple Contractors in a multi-round approach. The Outsourcer sends different inputs to each Contractor in every round.…”
Section: Related Workmentioning
confidence: 99%
“…Re-execution can be implemented in several ways. In [10], the authors propose outsourcing computation to multiple Contractors in a multi-round approach. The Outsourcer sends different inputs to each Contractor in every round.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, trust was introduced in the concept of social cloud [62,63,64,65,66,67,68,69,70]. In [63], Mohaisen et al employ trust as a metric to identify good workers for an outsourcer through her social network.…”
Section: Trust In Cloud Computingmentioning
confidence: 99%
“…In [68], Moyano et al proposed a framework to employ trust and reputation for cloud provider selection. In [70], Pietro et al proposed a multi-round approach, called AntiCheetah, to dynamically assign tasks to cloud nodes, accounting for their trustworthiness. In [64], Zhou et al studied the trust factors affecting potential partnerships in bike sharing systems.…”
Section: Trust In Cloud Computingmentioning
confidence: 99%
“…Along with the rapid development of the Internet and online services, trust has been used in many applications for either improving users' quality of experience (QoE) or preventing the disturbance of malicious users. Recently, trust was introduced in the concept of social cloud [20,21,22,23,24,25,26,27,28]. Trust is also introduced in cyber-physical and edge computing systems, e.g., wireless sensor networks [29,30,31,32,33,34,35,36,37,38] and vehicular networks [39,40,41,42].…”
Section: Related Workmentioning
confidence: 99%