Sealed computation: Abstract requirements for mechanisms to support trustworthy cloud computing

Beitrag bei einer Tagung


Details zur Publikation

Autorinnen und Autoren: Abdullah L, Freiling F, Quintero J, Benenson Z
Herausgeber: Frédéric Cuppens, Nora Cuppens, Christos Kalloniatis, Sokratis K. Katsikas, Costas Lambrinoudakis, John Mylopoulos, Annie Antón, Stefanos Gritzalis
Verlag: Springer Verlag
Jahr der Veröffentlichung: 2019
Band: 11387 LNCS
Tagungsband: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Seitenbereich: 137-152
ISBN: 9783030127855
ISSN: 0302-9743


Abstract

In cloud computing, data processing is delegated to a remote party for efficiency and flexibility reasons. A practical user requirement usually is that the confidentiality and integrity of data processing needs to be protected. In the common scenarios of cloud computing today, this can only be achieved by assuming that the remote party does not in any form act maliciously. In this paper, we propose an approach that avoids having to trust a single entity. Our approach is based on two concepts: (1) the technical abstraction of sealed computation, i.e., a technical mechanism to confine the processing of data within a tamper-proof hardware container, and (2) the additional role of an auditing party that itself cannot add functionality to the system but is able to check whether the system (including the mechanism for sealed computation) works as expected. We discuss the abstract technical and procedural requirements of these concepts and explain how they can be applied in practice.


FAU-Autorinnen und Autoren / FAU-Herausgeberinnen und Herausgeber

Abdullah, Lamya
Lehrstuhl für Informatik 1 (IT-Sicherheitsinfrastrukturen)
Benenson, Zinaida Dr.
Lehrstuhl für Informatik 1 (IT-Sicherheitsinfrastrukturen)
Freiling, Felix Prof. Dr.-Ing.
Lehrstuhl für Informatik 1 (IT-Sicherheitsinfrastrukturen)
Quintero, Juan
Lehrstuhl für Informatik 1 (IT-Sicherheitsinfrastrukturen)


Zitierweisen

APA:
Abdullah, L., Freiling, F., Quintero, J., & Benenson, Z. (2019). Sealed computation: Abstract requirements for mechanisms to support trustworthy cloud computing. In Frédéric Cuppens, Nora Cuppens, Christos Kalloniatis, Sokratis K. Katsikas, Costas Lambrinoudakis, John Mylopoulos, Annie Antón, Stefanos Gritzalis (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 137-152). Barcelona, ES: Springer Verlag.

MLA:
Abdullah, Lamya, et al. "Sealed computation: Abstract requirements for mechanisms to support trustworthy cloud computing." Proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018 and 2nd International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018 held in conjunction with 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona Ed. Frédéric Cuppens, Nora Cuppens, Christos Kalloniatis, Sokratis K. Katsikas, Costas Lambrinoudakis, John Mylopoulos, Annie Antón, Stefanos Gritzalis, Springer Verlag, 2019. 137-152.

BibTeX: 

Zuletzt aktualisiert 2019-17-06 um 15:53