2011
DOI: 10.1007/978-3-642-24712-5_3
|View full text |Cite
|
Sign up to set email alerts
|

Twin Clouds: Secure Cloud Computing with Low Latency

Abstract: Abstract. Cloud computing promises a cost effective enabling technology to outsource storage and massively parallel computations. However, existing approaches for provably secure outsourcing of data and arbitrary computations are either based on tamper-proof hardware or fully homomorphic encryption. The former approaches are not scaleable, while the latter ones are currently not efficient enough to be used in practice.We propose an architecture and protocols that accumulate slow secure computations over time a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
34
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 63 publications
(34 citation statements)
references
References 29 publications
0
34
0
Order By: Relevance
“…There are also several implementations besides ours [48,57,52,53,10], and architectural contributions [11]. Some applicationspecific solutions exist as well, such as algebraic computations [8], polynomial evaluation [23,7], map-reduce [61], sequence comparisons [3], linear programming [60], modular exponentiation [34,18], and outsourcing to sensor devices [32].…”
Section: Related Workmentioning
confidence: 99%
“…There are also several implementations besides ours [48,57,52,53,10], and architectural contributions [11]. Some applicationspecific solutions exist as well, such as algebraic computations [8], polynomial evaluation [23,7], map-reduce [61], sequence comparisons [3], linear programming [60], modular exponentiation [34,18], and outsourcing to sensor devices [32].…”
Section: Related Workmentioning
confidence: 99%
“…In the Twin clouds [32] secure cloud computing architecture, the client uses a private cloud for creating garbled circuits and a public commodity cloud for evaluating them. Our solution, however, utilizes multiple public cloud servers for creating as well as evaluating the garbled circuits.…”
Section: Related Workmentioning
confidence: 99%
“…But only identify the actual user does not all times give relief from data hacking or intruding data or information saved in the database of cloud environment. Yao's Garbled Circuit is used for secure data saving in cloud servers [13,14]. But it is also an identification based work.…”
Section: Related Workmentioning
confidence: 99%