Sciweavers

TRUST
2010
Springer

Token-Based Cloud Computing

14 years 4 months ago
Token-Based Cloud Computing
Secure outsourcing of computation to an untrusted (cloud) service provider is becoming more and more important. Pure cryptographic solutions based on fully homomorphic and verifiable encryption, recently proposed, are promising but suffer from very high latency. Other proposals perform the whole computation on tamper-proof hardware and usually suffer from the the same problem. Trusted computing (TC) is another promising approach that uses trusted software and hardware components on computing platforms to provide useful mechanisms such as attestation allowing the data owner to verify the integrity of the cloud and its computation. However, on the one hand these solutions require trust in hardware (CPU, trusted computing modules) that are under the physical control of the cloud provider, and on the other hand they still have to face the challenge of run-time attestation. In this paper we focus on applications where the latency of the computation should be minimized, i.e., the time fro...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Marcel
Added 11 Jul 2010
Updated 11 Jul 2010
Type Conference
Year 2010
Where TRUST
Authors Ahmad-Reza Sadeghi, Thomas Schneider 0003, Marcel Winandy
Comments (0)