资源描述:
《On the Impossibility of Cryptography Alone for》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、OntheImpossibilityofCryptographyAloneforPrivacy-PreservingCloudComputingMartenvanDijkAriJuelsRSALaboratoriesRSALaboratoriesmarten.vandijk@rsa.comajuels@rsa.comAbstractForallthebenefitsofcloudcomputing,though,itde-privesclientsofdirectcontroloverthesystemsthatman-Cloudcomputingdenotesanarch
2、itecturalshifttowardagetheirdata.Thusarisesacentralconcernofcloudthinclientsandconvenientlycentralizedprovisionofcomputing:Howcanclientstrustthatacloudprovidercomputingresources.Clients’lackofdirectresourcewillprotecttheprivacyoftheirdata,i.e.,notleaktheircontrolinthecloudpromptsconcernab
3、outthepotentialdataoritselfusetheirdatainappropriately?fordataprivacyviolations,particularlyabuseorleakageInthispaper,weexploreprivacyprotectionincloudofsensitiveinformationbyserviceproviders.Cryptog-architectures.Inparticular,weconsiderthechallengeofraphyisanoft-toutedremedy.Amongitsmost
4、power-havingacloudservicerunapplicationsoverclientdatafulprimitivesisfullyhomomorphicencryption(FHE),while:(1)Notbeingabletolearnanyinformationitselfdubbedbysomethefield’s“HolyGrail,”andrecentlyand(2)Releasingoutputvaluestoclientsinaccordancerealizedasafullyfunctionalconstructwithseemingwi
5、thanaccess-controlpolicy.Wearguethatbyitself,promiseforcloudprivacy.cryptography—andbyimplication,anylogicallayerin-Wearguethatcryptographyalonecan’tenforcetheformationsecuritytool—can’tsolvethisprobleminitsprivacydemandedbycommoncloudcomputingser-fullgenerality.Yetthisprivacy-preservingm
6、odelisex-vices,evenwithsuchpowerfultoolsasFHE.Wefor-actlytheoneultimatelydesiredforcloudapplicationsin-mallydefineahierarchyofnaturalclassesofprivatevolvingmultipletenants,suchassocialnetworking,doc-cloudapplications,andshowthatnocryptographicpro-umentsharing,andsoforth.Givenrecentexciteme
7、nttocolcanimplementthoseclasseswheredataissharedoverthepotentialofnew,powerfulconstructssuchasamongclients.Wepositthatusersofcloudserviceswillfullyhomomorphicencryption(FHE)[11]tosupportthealsoneedtorelyonotherformsofprivacyenforcement,privacyneedsofcloudcomputing,w