Toward protecting control flow confidentiality in cloud-based computation
نویسندگان
چکیده
Idea: • Transform each original program into a public program and a private program. • Public program: execute on the public cloud; perform most execution except for evaluating predicates of branch statements. • Private program: execute on private cloud; evaluate predicates. Proposed Techniques: • Replace predicates of the branch statements in the original program with control flow query (CFQ) invocations to the private program. • Insert indistinguishable fake branch statements in the original program to raise the bar for the attacker to understand the algorithm’s control flow. • Maintain a continuous cache to reduce the cost of cross-cloud communication.
منابع مشابه
A Robust Image Encryption Scheme Based on RSA and Secret Sharing for Cloud Storage Systems
To date, the cloud storage system has been well developed. It is a system that provides users with large storage, high computation ability, and convenience. However, users cannot fully trust a cloud storage system because it is an “honest but curious”server. For this reason, protecting data confidentiality and data integrity are two important issues in a cloud storage system. In this paper, we ...
متن کاملA Method for Protecting Access Pattern in Outsourced Data
Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...
متن کاملA Protocol for Preventing Insider Attacks in Untrusted Infrastructure-as-a-Service Clouds
Recent technical advances in utility computing have allowed small and medium sized businesses to move their applications to the cloud, to benefit from features such as auto-scaling and pay-as-you-go facilities. Before clouds are widely adopted, there is a need to address privacy concerns of customer data outsourced to these platforms. In this paper, we present a practical approach for protectin...
متن کاملA Privacy-Preserving Model for Biometric Fusion
Biometric designs have attracted attention in practical technological schemes with high requirements in terms of accuracy, security and privacy. Nevertheless, multimodalities have been approached with skepticism, as fusion deployments are affected by performance metrics. In this paper, we introduce a basic fusion model blueprint for a privacypreserving cloud-based user verification/authenticati...
متن کاملEfficient integrity checks for join queries in the cloud
Cloud computing is receiving massive interest from users and companies for its convenient support of scalable access to data and services. The variety and diversification of offers by cloud providers allow users to selectively adopt storage and computational services as they best suit their needs, including cost saving considerations. In such an open context, security remains a major concern, a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computers & Security
دوره 52 شماره
صفحات -
تاریخ انتشار 2015