A Second View on SecureString 2.0

  • Günter Fahrnberger
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8337)

Abstract

Many companies have thought about using external hosting solutions. Cloud computing as such a solution attracts prospective users who want to avoid initial costs and standing expenses with the underlying pay-as-you-use model. The outsourcing of sensitive information implies security risks, like eavesdropping and sabotage, for them as soon as they pass any unconfident area. If an outhouse hosting solution serves as data storage only, then an end-to-end cryptosystem without the necessity of having homomorphic properties comes up with the answer. Moreover, secure computations on the encrypted data need the use of more complex cryptosystems. SecureString 1.0 [3] and SecureString 2.0 [4] were proposed as such complex cryptosystems that focus on computing on encrypted character strings in untrustworthy environments (like clouds). While SecureString 1.0 offered a too inflexible approach, SecureString 2.0 as its improvement was introduced textually at a high level only so far. This paper contributes to foster the understanding of SecureString 2.0 by providing performance analysis for its supported operations plus formal definitions, theorems and proofs.

Keywords

blind computing character string character string function character string operation cloud cloud computing secure computing string function string operation 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Atallah, M.J., Pantazopoulos, K., Rice, J.R., Spafford, E.E.: Secure outsourcing of scientific computations. In: Zelkowitz, M.V. (ed.) Trends in Software Engineering. Advances in Computers, vol. 54, pp. 215–272. Elsevier (2002)Google Scholar
  2. 2.
    Brun, Y., Medvidovic, N.: Keeping data private while computing in the cloud. In: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD), pp. 285–294 (2012)Google Scholar
  3. 3.
    Fahrnberger, G.: Computing on encrypted character strings in clouds. In: Hota, C., Srimani, P.K. (eds.) ICDCIT 2013. LNCS, vol. 7753, pp. 244–254. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  4. 4.
    Fahrnberger, G.: Securestring 2.0 - a cryptosystem for computing on encrypted character strings in clouds. In: Innovative Internet Community Systems, VDI Düsseldorf (2013)Google Scholar
  5. 5.
    Goluch, S.: The development of homomorphic cryptography - from rsa to gentrys privacy homomorphism. Master’s thesis, Vienna University of Technology (2011)Google Scholar
  6. 6.
    Itani, W., Kayssi, A., Chehab, A.: Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures. In: Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2009, pp. 711–716 (2009)Google Scholar
  7. 7.
    Maheshwari, N., Kiyawat, K.: Structural framing of protocol for secure multiparty cloud computation. In: 2011 Fifth Asia Modelling Symposium (AMS), pp. 187–192 (2011)Google Scholar
  8. 8.
    Mehta, C.R., Patel, N.R.: A network algorithm for performing fisher’s exact test in r x c contingency tables. Journal of the American Statistical Association 78(382), 427–434 (1983)MATHMathSciNetGoogle Scholar
  9. 9.
    Rodríguez-Silva, D.A., González-Castaño, F.J., Adkinson-Orellana, L., Fernández-Cordeiro, A., Troncoso-Pastoriza, J.R., González-Martínez, D.: Encrypted domain processing for cloud privacy - concept and practical experience. In: CLOSER, pp. 591–596 (2011)Google Scholar
  10. 10.
    Wei, L., Zhu, H., Cao, Z., Jia, W., Vasilakos, A.: Seccloud: Bridging secure storage and computation in cloud. In: 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 52–61 (2010)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Günter Fahrnberger
    • 1
  1. 1.University of HagenHagenGermany

Personalised recommendations