Sealed Computation: Abstract Requirements for Mechanisms to Support Trustworthy Cloud Computing

06/18/2019
by   Lamya Abdullah, et al.
0

In cloud computing, data processing is delegated to a remote party for efficiency and flexibility reasons. A practical user requirement usually is that the confidentiality and integrity of data processing needs to be protected. In the common scenarios of cloud computing today, this can only be achieved by assuming that the remote party does not in any form act maliciously. In this paper, we propose an approach that avoids having to trust a single entity. Our approach is based on two concepts: (1) the technical abstraction of sealed computation, i.e., a technical mechanism to confine the processing of data within a tamper-proof hardware container, and (2) the additional role of an auditing party that itself cannot add functionality to the system but is able to check whether the system (including the mechanism for sealed computation) works as expected. We discuss the abstract technical and procedural requirements of these concepts and explain how they can be applied in practice.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/13/2019

Training on the Edge: The why and the how

Edge computing is the natural progression from Cloud computing, where, i...
research
06/24/2020

A Cloud Computing Capability Model for Large-Scale Semantic Annotation

Semantic technologies are designed to facilitate context-awareness for w...
research
06/13/2022

A Privacy Glossary for Cloud Computing

Cloud computing is an evolving paradigm that is frequently changing the ...
research
12/20/2021

NavP: Enabling Navigational Programming for Science Data Processing via Application-Initiated Checkpointing

Science Data Systems (SDS) handle science data from acquisition through ...
research
05/21/2020

SafeComp: Protocol For Certifying Cloud Computations Integrity

We define a problem of certifying computation integrity performed by som...
research
11/02/2018

Discrete model for cloud computing: Analysis of data security and data loss

Cloud computing is recognized as one of the most promising solutions to ...
research
08/31/2023

ChatGPT and Excel – trust, but verify

This paper adopts a critical approach to ChatGPT, showing how its huge r...

Please sign up or login with your details

Forgot password? Click here to reset