Secret program execution in the cloud applying homomorphic encryption

Michael Brenner, J. Wiebelitz, Gabriele von Voigt, Matthew Smith
{"title":"Secret program execution in the cloud applying homomorphic encryption","authors":"Michael Brenner, J. Wiebelitz, Gabriele von Voigt, Matthew Smith","doi":"10.1109/DEST.2011.5936608","DOIUrl":null,"url":null,"abstract":"A growing number of compute and data storage jobs is performed on remote resources. In a cloud environment the customer can't be sure where a particular job is physically executed and thus cannot rely on the security and confidentiality of the remote resource. A solution for this problem is operating on encrypted functions and encrypted data. This enables a customer to generate a program that can be executed by a third party, without revealing the underlying algorithm or the processed data. This helps securing applications and data in a distributed digital ecosystem. We present a method to compute a secret program on an untrusted resource using fully homomorphic encrypted circuits. We sketch an algebraic homomorphism as a cryptographic foundation and define a sample system architecture for which we provide a software implementation. Our concept solves the problems of encrypted storage access with encrypted addresses and encrypted branching: in contrast to other approaches, like static one-pass circuit simulations, our system supports dynamic parameters and non-linear programs, that render branch-decisions at runtime and cannot be represented in a circuit with hard-wired in-circuit parameters and data. Our implementation comprises the runtime environment for an encrypted program and an assembler to generate the encrypted machine code.","PeriodicalId":297420,"journal":{"name":"5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"84","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DEST.2011.5936608","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 84

Abstract

A growing number of compute and data storage jobs is performed on remote resources. In a cloud environment the customer can't be sure where a particular job is physically executed and thus cannot rely on the security and confidentiality of the remote resource. A solution for this problem is operating on encrypted functions and encrypted data. This enables a customer to generate a program that can be executed by a third party, without revealing the underlying algorithm or the processed data. This helps securing applications and data in a distributed digital ecosystem. We present a method to compute a secret program on an untrusted resource using fully homomorphic encrypted circuits. We sketch an algebraic homomorphism as a cryptographic foundation and define a sample system architecture for which we provide a software implementation. Our concept solves the problems of encrypted storage access with encrypted addresses and encrypted branching: in contrast to other approaches, like static one-pass circuit simulations, our system supports dynamic parameters and non-linear programs, that render branch-decisions at runtime and cannot be represented in a circuit with hard-wired in-circuit parameters and data. Our implementation comprises the runtime environment for an encrypted program and an assembler to generate the encrypted machine code.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
在云中应用同态加密的秘密程序执行
越来越多的计算和数据存储任务在远程资源上执行。在云环境中,客户无法确定特定作业的物理执行位置,因此无法依赖远程资源的安全性和机密性。此问题的解决方案是对加密的函数和加密的数据进行操作。这使客户能够生成可由第三方执行的程序,而无需暴露底层算法或处理过的数据。这有助于保护分布式数字生态系统中的应用程序和数据。提出了一种利用全同态加密电路在不可信资源上计算秘密程序的方法。我们概述了一个代数同态作为密码基础,并定义了一个示例系统架构,我们为其提供了一个软件实现。我们的概念解决了加密地址和加密分支的加密存储访问问题:与其他方法(如静态单通电路模拟)相比,我们的系统支持动态参数和非线性程序,这些程序在运行时呈现分支决策,并且不能在电路中用硬连线的电路参数和数据表示。我们的实现包括用于加密程序的运行时环境和用于生成加密机器码的汇编程序。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Innovation adoption forum for industry and public sector Global path planning using improved ant colony optimization algorithm through bilateral cooperative exploration Double burst error correction method: Case of interference incidents during data transmission in wired channels Overview of cognitive visualisation Interval type-2 fuzzy logic controllers for flocking behavior
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1