{"title":"Securing Data in Compromised Clouds","authors":"R. A. Popa","doi":"10.1145/3357223.3365869","DOIUrl":null,"url":null,"abstract":"Clouds store a lot of sensitive data. Traditional cloud security relies on building software walls around sensitive data to prevent attackers from breaking in. Nevertheless, attackers always manage to break in because software is complex and thus cannot be exploit-free. A line of cryptographic systems, however, departs from this approach, and provides security guarantees even when attackers have compromised the cloud. In this talk, I will survey a decade of such cryptographic systems, highlighting the main design principles and lessons learned, and pointing to the state-of-the-art systems that one can use today.","PeriodicalId":91949,"journal":{"name":"Proceedings of the ... ACM Symposium on Cloud Computing [electronic resource] : SOCC ... ... SoCC (Conference)","volume":"214 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the ... ACM Symposium on Cloud Computing [electronic resource] : SOCC ... ... SoCC (Conference)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3357223.3365869","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Clouds store a lot of sensitive data. Traditional cloud security relies on building software walls around sensitive data to prevent attackers from breaking in. Nevertheless, attackers always manage to break in because software is complex and thus cannot be exploit-free. A line of cryptographic systems, however, departs from this approach, and provides security guarantees even when attackers have compromised the cloud. In this talk, I will survey a decade of such cryptographic systems, highlighting the main design principles and lessons learned, and pointing to the state-of-the-art systems that one can use today.