ICDCIT 2014: Distributed Computing and Internet Technology pp 239-250 | Cite as
A Second View on SecureString 2.0
Abstract
Many companies have thought about using external hosting solutions. Cloud computing as such a solution attracts prospective users who want to avoid initial costs and standing expenses with the underlying pay-as-you-use model. The outsourcing of sensitive information implies security risks, like eavesdropping and sabotage, for them as soon as they pass any unconfident area. If an outhouse hosting solution serves as data storage only, then an end-to-end cryptosystem without the necessity of having homomorphic properties comes up with the answer. Moreover, secure computations on the encrypted data need the use of more complex cryptosystems. SecureString 1.0 [3] and SecureString 2.0 [4] were proposed as such complex cryptosystems that focus on computing on encrypted character strings in untrustworthy environments (like clouds). While SecureString 1.0 offered a too inflexible approach, SecureString 2.0 as its improvement was introduced textually at a high level only so far. This paper contributes to foster the understanding of SecureString 2.0 by providing performance analysis for its supported operations plus formal definitions, theorems and proofs.
Keywords
blind computing character string character string function character string operation cloud cloud computing secure computing string function string operationPreview
Unable to display preview. Download preview PDF.
References
- 1.Atallah, M.J., Pantazopoulos, K., Rice, J.R., Spafford, E.E.: Secure outsourcing of scientific computations. In: Zelkowitz, M.V. (ed.) Trends in Software Engineering. Advances in Computers, vol. 54, pp. 215–272. Elsevier (2002)Google Scholar
- 2.Brun, Y., Medvidovic, N.: Keeping data private while computing in the cloud. In: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD), pp. 285–294 (2012)Google Scholar
- 3.Fahrnberger, G.: Computing on encrypted character strings in clouds. In: Hota, C., Srimani, P.K. (eds.) ICDCIT 2013. LNCS, vol. 7753, pp. 244–254. Springer, Heidelberg (2013)CrossRefGoogle Scholar
- 4.Fahrnberger, G.: Securestring 2.0 - a cryptosystem for computing on encrypted character strings in clouds. In: Innovative Internet Community Systems, VDI Düsseldorf (2013)Google Scholar
- 5.Goluch, S.: The development of homomorphic cryptography - from rsa to gentrys privacy homomorphism. Master’s thesis, Vienna University of Technology (2011)Google Scholar
- 6.Itani, W., Kayssi, A., Chehab, A.: Privacy as a service: Privacy-aware data storage and processing in cloud computing architectures. In: Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2009, pp. 711–716 (2009)Google Scholar
- 7.Maheshwari, N., Kiyawat, K.: Structural framing of protocol for secure multiparty cloud computation. In: 2011 Fifth Asia Modelling Symposium (AMS), pp. 187–192 (2011)Google Scholar
- 8.Mehta, C.R., Patel, N.R.: A network algorithm for performing fisher’s exact test in r x c contingency tables. Journal of the American Statistical Association 78(382), 427–434 (1983)MATHMathSciNetGoogle Scholar
- 9.Rodríguez-Silva, D.A., González-Castaño, F.J., Adkinson-Orellana, L., Fernández-Cordeiro, A., Troncoso-Pastoriza, J.R., González-Martínez, D.: Encrypted domain processing for cloud privacy - concept and practical experience. In: CLOSER, pp. 591–596 (2011)Google Scholar
- 10.Wei, L., Zhu, H., Cao, Z., Jia, W., Vasilakos, A.: Seccloud: Bridging secure storage and computation in cloud. In: 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 52–61 (2010)Google Scholar