Home // CLOUD COMPUTING 2016, The Seventh International Conference on Cloud Computing, GRIDs, and Virtualization // View article


Towards Using Homomorphic Encryption for Cryptographic Access Control in Outsourced Data Processing

Authors:
Stefan Rass
Peter Schartner

Keywords: private function evaluation; cloud computing; licensing; security; cryptography

Abstract:
We report on a computational model for data processing in privacy. As a core design goal here, we will focus on how the data owner can authorize another party to process data on his behalf. In that scenario, the algorithm or software for the processing can even be provided by a third party. The goal is here to protect the intellectual property rights of all three players (data owner, execution environment and software vendor), while retaining an efficient system that allows data processing in distrusted environments, such as clouds. We first sketch a simple method for private function evaluation. On this basis, we describe how code and data can be bound together, to implement an intrinsic access control, so that the user remains the exclusive owner of the data, and a software vendor can prevent any use of code unless it is licensed. Since there is no access control logic, we gain a particularly strong protection against code manipulations (such as "cracking" of software).

Pages: 7 to 13

Copyright: Copyright (c) IARIA, 2016

Publication date: March 20, 2016

Published in: conference

ISSN: 2308-4294

ISBN: 978-1-61208-460-2

Location: Rome, Italy

Dates: from March 20, 2016 to March 24, 2016