{"title":"保护受损云中的数据","authors":"R. A. Popa","doi":"10.1145/3357223.3365869","DOIUrl":null,"url":null,"abstract":"Clouds store a lot of sensitive data. Traditional cloud security relies on building software walls around sensitive data to prevent attackers from breaking in. Nevertheless, attackers always manage to break in because software is complex and thus cannot be exploit-free. A line of cryptographic systems, however, departs from this approach, and provides security guarantees even when attackers have compromised the cloud. In this talk, I will survey a decade of such cryptographic systems, highlighting the main design principles and lessons learned, and pointing to the state-of-the-art systems that one can use today.","PeriodicalId":91949,"journal":{"name":"Proceedings of the ... ACM Symposium on Cloud Computing [electronic resource] : SOCC ... ... SoCC (Conference)","volume":"214 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Securing Data in Compromised Clouds\",\"authors\":\"R. A. Popa\",\"doi\":\"10.1145/3357223.3365869\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Clouds store a lot of sensitive data. Traditional cloud security relies on building software walls around sensitive data to prevent attackers from breaking in. Nevertheless, attackers always manage to break in because software is complex and thus cannot be exploit-free. A line of cryptographic systems, however, departs from this approach, and provides security guarantees even when attackers have compromised the cloud. In this talk, I will survey a decade of such cryptographic systems, highlighting the main design principles and lessons learned, and pointing to the state-of-the-art systems that one can use today.\",\"PeriodicalId\":91949,\"journal\":{\"name\":\"Proceedings of the ... ACM Symposium on Cloud Computing [electronic resource] : SOCC ... ... SoCC (Conference)\",\"volume\":\"214 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-11-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the ... ACM Symposium on Cloud Computing [electronic resource] : SOCC ... ... SoCC (Conference)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3357223.3365869\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the ... ACM Symposium on Cloud Computing [electronic resource] : SOCC ... ... SoCC (Conference)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3357223.3365869","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Clouds store a lot of sensitive data. Traditional cloud security relies on building software walls around sensitive data to prevent attackers from breaking in. Nevertheless, attackers always manage to break in because software is complex and thus cannot be exploit-free. A line of cryptographic systems, however, departs from this approach, and provides security guarantees even when attackers have compromised the cloud. In this talk, I will survey a decade of such cryptographic systems, highlighting the main design principles and lessons learned, and pointing to the state-of-the-art systems that one can use today.