Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas (2011)
Twin Clouds: An Architecture for Secure Cloud Computing.
Workshop on Cryptography and Security in Clouds (WCSC'11). Zurich, Switzerland (15.03.2011 - 16.03.2011)
Konferenzveröffentlichung, Bibliographie
Kurzbeschreibung (Abstract)
Cloud computing promises a more cost effective enabling technology to outsource storage and computations. Existing approaches for secure outsourcing of data and arbitrary computations are either based on a single tamper-proof hardware, or based on recently proposed fully homomorphic encryption. The hardware based solutions are not scaleable, and fully homomorphic encryption is currently only of theoretical interest and very inefficient. In this paper we propose an architecture for secure outsourcing of data and arbitrary computations to an untrusted commodity cloud. In our approach, the user communicates with a trusted cloud (either a private cloud or built from multiple secure hardware modules) which encrypts and verifies the data stored and operations performed in the untrusted commodity cloud. We split the computations such that the trusted cloud is mostly used for security-critical operations in the less time-critical setup phase, whereas queries to the outsourced data are processed in parallel by the fast commodity cloud on encrypted data.
Typ des Eintrags: | Konferenzveröffentlichung |
---|---|
Erschienen: | 2011 |
Autor(en): | Bugiel, Sven ; Nürnberger, Stefan ; Sadeghi, Ahmad-Reza ; Schneider, Thomas |
Art des Eintrags: | Bibliographie |
Titel: | Twin Clouds: An Architecture for Secure Cloud Computing |
Sprache: | Englisch |
Publikationsjahr: | März 2011 |
Veranstaltungstitel: | Workshop on Cryptography and Security in Clouds (WCSC'11) |
Veranstaltungsort: | Zurich, Switzerland |
Veranstaltungsdatum: | 15.03.2011 - 16.03.2011 |
Kurzbeschreibung (Abstract): | Cloud computing promises a more cost effective enabling technology to outsource storage and computations. Existing approaches for secure outsourcing of data and arbitrary computations are either based on a single tamper-proof hardware, or based on recently proposed fully homomorphic encryption. The hardware based solutions are not scaleable, and fully homomorphic encryption is currently only of theoretical interest and very inefficient. In this paper we propose an architecture for secure outsourcing of data and arbitrary computations to an untrusted commodity cloud. In our approach, the user communicates with a trusted cloud (either a private cloud or built from multiple secure hardware modules) which encrypts and verifies the data stored and operations performed in the untrusted commodity cloud. We split the computations such that the trusted cloud is mostly used for security-critical operations in the less time-critical setup phase, whereas queries to the outsourced data are processed in parallel by the fast commodity cloud on encrypted data. |
Fachbereich(e)/-gebiet(e): | 20 Fachbereich Informatik 20 Fachbereich Informatik > Systemsicherheit 20 Fachbereich Informatik > EC SPRIDE 20 Fachbereich Informatik > EC SPRIDE > Engineering Cryptographic Protocols (am 01.03.18 aufgegangen in Praktische Kryptographie und Privatheit) |
Hinterlegungsdatum: | 25 Jun 2012 13:25 |
Letzte Änderung: | 06 Aug 2024 07:59 |
PPN: | |
Export: | |
Suche nach Titel in: | TUfind oder in Google |
Frage zum Eintrag |
Optionen (nur für Redakteure)
Redaktionelle Details anzeigen |