Secret program execution in the cloud applying homomorphic encryption

Michael Brenner, J. Wiebelitz, Gabriele von Voigt, Matthew Smith
{"title":"Secret program execution in the cloud applying homomorphic encryption","authors":"Michael Brenner, J. Wiebelitz, Gabriele von Voigt, Matthew Smith","doi":"10.1109/DEST.2011.5936608","DOIUrl":null,"url":null,"abstract":"A growing number of compute and data storage jobs is performed on remote resources. In a cloud environment the customer can't be sure where a particular job is physically executed and thus cannot rely on the security and confidentiality of the remote resource. A solution for this problem is operating on encrypted functions and encrypted data. This enables a customer to generate a program that can be executed by a third party, without revealing the underlying algorithm or the processed data. This helps securing applications and data in a distributed digital ecosystem. We present a method to compute a secret program on an untrusted resource using fully homomorphic encrypted circuits. We sketch an algebraic homomorphism as a cryptographic foundation and define a sample system architecture for which we provide a software implementation. Our concept solves the problems of encrypted storage access with encrypted addresses and encrypted branching: in contrast to other approaches, like static one-pass circuit simulations, our system supports dynamic parameters and non-linear programs, that render branch-decisions at runtime and cannot be represented in a circuit with hard-wired in-circuit parameters and data. Our implementation comprises the runtime environment for an encrypted program and an assembler to generate the encrypted machine code.","PeriodicalId":297420,"journal":{"name":"5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"84","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DEST.2011.5936608","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 84

Abstract

A growing number of compute and data storage jobs is performed on remote resources. In a cloud environment the customer can't be sure where a particular job is physically executed and thus cannot rely on the security and confidentiality of the remote resource. A solution for this problem is operating on encrypted functions and encrypted data. This enables a customer to generate a program that can be executed by a third party, without revealing the underlying algorithm or the processed data. This helps securing applications and data in a distributed digital ecosystem. We present a method to compute a secret program on an untrusted resource using fully homomorphic encrypted circuits. We sketch an algebraic homomorphism as a cryptographic foundation and define a sample system architecture for which we provide a software implementation. Our concept solves the problems of encrypted storage access with encrypted addresses and encrypted branching: in contrast to other approaches, like static one-pass circuit simulations, our system supports dynamic parameters and non-linear programs, that render branch-decisions at runtime and cannot be represented in a circuit with hard-wired in-circuit parameters and data. Our implementation comprises the runtime environment for an encrypted program and an assembler to generate the encrypted machine code.
在云中应用同态加密的秘密程序执行
越来越多的计算和数据存储任务在远程资源上执行。在云环境中,客户无法确定特定作业的物理执行位置,因此无法依赖远程资源的安全性和机密性。此问题的解决方案是对加密的函数和加密的数据进行操作。这使客户能够生成可由第三方执行的程序,而无需暴露底层算法或处理过的数据。这有助于保护分布式数字生态系统中的应用程序和数据。提出了一种利用全同态加密电路在不可信资源上计算秘密程序的方法。我们概述了一个代数同态作为密码基础,并定义了一个示例系统架构,我们为其提供了一个软件实现。我们的概念解决了加密地址和加密分支的加密存储访问问题:与其他方法(如静态单通电路模拟)相比,我们的系统支持动态参数和非线性程序,这些程序在运行时呈现分支决策,并且不能在电路中用硬连线的电路参数和数据表示。我们的实现包括用于加密程序的运行时环境和用于生成加密机器码的汇编程序。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信