Method and apparatus for secure signing and utilization of distributed computations
First Claim
1. A method comprising:
- determining, by an apparatus, a lattice of signatures of a distributed cloud computation environment, wherein the distributed cloud computation environment includes a plurality of functional flows, at least one of the functional flows includes distribution paths that represent a distribution of computation closures associated with respective levels of the distributed cloud computation environment, each of the computation closures is a granular reflective set of instructions, data, and related execution context, the lattice consists of root elements of all signatures in the distributed cloud computation environment, and the root elements are parameters of one or more security requirements, one or more functional flow specifications, one or more computation distribution maps, one or more links among the computation closures and the respective levels, or a combination thereof in the distributed cloud computation environment;
formatting, by the apparatus, each of the computation closures of the at least one functional flow and a subset of the signatures corresponding to the computation closures in a predetermined semantic information representation structure;
initiating, by the apparatus, a signing of the computation closures with the of the signatures;
initiating, by the apparatus, a transfer of the signed computation closures among one or more of the respective levels, one or more nodes, or a combination thereof of the distributed cloud computation environment;
initiating, by the apparatus, an authentication of the signed computation closures as transferred by comparing the lattice with root elements of the signed computation closures; and
initiating, by the apparatus, an execution of the signed computation closures at the one or more levels, the one or more nodes, or a combination thereof based, at least in part, on an authentication of the signed computation closure.
2 Assignments
0 Petitions
Accused Products
Abstract
An approach is provided for providing secure signing and utilization of distributed computations. A distributed computation authentication platform causes, at least in part, a signing of one or more computation closures of at least one functional flow. The distributed computation authentication platform also processes and/or facilitates a processing of the one or more signed computation closures to cause, at least in part, a transfer of the one or more signed computation closures among one or more levels, one or more nodes, or a combination thereof, wherein an execution of the one or more signed computation closures at the one or more levels, the one or more nodes, or a combination thereof is based, at least in part, on an authentication of the signed one or more computation closure.
-
Citations
20 Claims
-
1. A method comprising:
-
determining, by an apparatus, a lattice of signatures of a distributed cloud computation environment, wherein the distributed cloud computation environment includes a plurality of functional flows, at least one of the functional flows includes distribution paths that represent a distribution of computation closures associated with respective levels of the distributed cloud computation environment, each of the computation closures is a granular reflective set of instructions, data, and related execution context, the lattice consists of root elements of all signatures in the distributed cloud computation environment, and the root elements are parameters of one or more security requirements, one or more functional flow specifications, one or more computation distribution maps, one or more links among the computation closures and the respective levels, or a combination thereof in the distributed cloud computation environment; formatting, by the apparatus, each of the computation closures of the at least one functional flow and a subset of the signatures corresponding to the computation closures in a predetermined semantic information representation structure; initiating, by the apparatus, a signing of the computation closures with the of the signatures; initiating, by the apparatus, a transfer of the signed computation closures among one or more of the respective levels, one or more nodes, or a combination thereof of the distributed cloud computation environment; initiating, by the apparatus, an authentication of the signed computation closures as transferred by comparing the lattice with root elements of the signed computation closures; and initiating, by the apparatus, an execution of the signed computation closures at the one or more levels, the one or more nodes, or a combination thereof based, at least in part, on an authentication of the signed computation closure. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code for one or more programs, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus embedded in a device to perform at least the following, determine a lattice of signatures of a distributed cloud computation environment, wherein the distributed cloud computation environment includes a plurality of functional flows, at least one of the functional flows includes distribution paths that represent a distribution of computation closures associated with respective levels of the distributed cloud computation environment, each of the computation closures is a granular reflective set of instructions, data, and related execution context, the lattice consists of root elements of all signatures in the distributed cloud computation environment, and the root elements are parameters of one or more security requirements, one or more functional flow specifications, one or more computation distribution maps, one or more links among the computation closures and the respective levels, or a combination thereof in the distributed cloud computation environment; format each of the computation closures of the at least one functional flow and a subset of the signatures corresponding to the computation closures in a predetermined semantic information representation structure; initiate a signing of the computation closures with the subset of the signatures; initiate a transfer of the signed computation closures among one or more of the respective levels, one or more nodes, or a combination thereof of the distributed cloud computation environment; initiate an authentication of the signed computation closures as transferred by comparing the lattice with root elements of the signed computation closures; and initiate an execution of the signed computation closures at the one or more levels, the one or more nodes, or a combination thereof based, at least in part, on an authentication of the signed computation closure. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification