Toward protecting control flow confidentiality in cloud-based computation

نویسندگان

  • Yongzhi Wang
  • Jinpeng Wei
چکیده

Idea: • Transform each original program into a public program and a private program. • Public program: execute on the public cloud; perform most execution except for evaluating predicates of branch statements. • Private program: execute on private cloud; evaluate predicates. Proposed Techniques: • Replace predicates of the branch statements in the original program with control flow query (CFQ) invocations to the private program. • Insert indistinguishable fake branch statements in the original program to raise the bar for the attacker to understand the algorithm’s control flow. • Maintain a continuous cache to reduce the cost of cross-cloud communication.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems

To date, the cloud storage system has been well developed. It is a system that provides users with large storage, high computation ability, and convenience. However, users cannot fully trust a cloud storage system because it is an “honest but curious”server. For this reason, protecting data confidentiality and data integrity are two important issues in a cloud storage system. In this paper, we ...

متن کامل

A Method for Protecting Access Pattern in Outsourced Data

Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...

متن کامل

A Protocol for Preventing Insider Attacks in Untrusted Infrastructure-as-a-Service Clouds

Recent technical advances in utility computing have allowed small and medium sized businesses to move their applications to the cloud, to benefit from features such as auto-scaling and pay-as-you-go facilities. Before clouds are widely adopted, there is a need to address privacy concerns of customer data outsourced to these platforms. In this paper, we present a practical approach for protectin...

متن کامل

A Privacy-Preserving Model for Biometric Fusion

Biometric designs have attracted attention in practical technological schemes with high requirements in terms of accuracy, security and privacy. Nevertheless, multimodalities have been approached with skepticism, as fusion deployments are affected by performance metrics. In this paper, we introduce a basic fusion model blueprint for a privacypreserving cloud-based user verification/authenticati...

متن کامل

Efficient integrity checks for join queries in the cloud

Cloud computing is receiving massive interest from users and companies for its convenient support of scalable access to data and services. The variety and diversification of offers by cloud providers allow users to selectively adopt storage and computational services as they best suit their needs, including cost saving considerations. In such an open context, security remains a major concern, a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 52  شماره 

صفحات  -

تاریخ انتشار 2015