6.892 Computing on Encrypted Data
نویسندگان
چکیده
Computing environments change: everyone has portable computing devices (in form of mobile phones) and access to large servers (in the cloud). This change presents fundamental challenge of outsourcing computation, which is motivated by the asymmetry of the available computing power. In recent computing scenarios clients are trusted (but weak), while computationally strong servers are untrusted as we do not exhibit full control over them. How to outsource (delegate) the computation? What about privacy of the outsourced computation? For example, how to outsource computing on medical data, which must be kept confidential at all times? Standard solution would be to encrypt the data: this perfectly solves any privacy issues. However, requirements for standard encryption schemes (in particular, non-malleability) also do not let us achieve the wanted functionality: we cannot perform any computations on the encrypted data.
منابع مشابه
6.892 Computing on Encrypted Data
So far, we have studied the problem of outsourcing computation when we want our data to be private from the server. Today, we will forget about privacy and focus on the problem of verifying that the server computes correctly for us. Specifically, we will look at decision problems. We consider the problem where we send the cloud x, and the cloud (efficiently) computes both f(x) as well as a proo...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کامل6.892 Computing on Encrypted Data Lecture 4
In the previous lecture we constructed a LWE-based secret-key encryption scheme that is somewhat homomorphic. More precisely, the scheme supports evaluation of log n depth circuits for every < 1 after using the Dimension Reduction technique that we also introduced in the previous lecture. Building upon this starting point, we will introduce two more techniques in this lecture. The first techniq...
متن کاملSESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملClassification of encrypted traffic for applications based on statistical features
Traffic classification plays an important role in many aspects of network management such as identifying type of the transferred data, detection of malware applications, applying policies to restrict network accesses and so on. Basic methods in this field were using some obvious traffic features like port number and protocol type to classify the traffic type. However, recent changes in applicat...
متن کامل