On securing untrusted clouds with cryptography

Y Chen, R Sion - Proceedings of the 9th annual ACM workshop on …, 2010 - dl.acm.org
In a recent interview, Whitfield Diffie argued that" the whole point of cloud computing is
economy" and while it is possible in principle for" computation to be done on encrypted …

Toward confidential cloud computing

M Russinovich, M Costa, C Fournet, D Chisnall… - Communications of the …, 2021 - dl.acm.org
Toward confidential cloud computing Page 1 54 COMMUNICATIONS OF THE ACM | JUNE
2021 | VOL. 64 | NO. 6 practice ALTHOUGH LARGELY DRIVEN by economies of scale, the …

Secure outsourced computation

J Loftus, NP Smart - International Conference on Cryptology in Africa, 2011 - Springer
The development of multi-party computation was one of the early achievements of
theoretical cryptography. Since that time a number of papers have been published which …

Cloud computing security and privacy: Standards and regulations

Y Yu, A Miyaji, MH Au, W Susilo - Computer Standards & Interfaces, 2017 - Elsevier
Cloud computing is a distributed computation model over a large pool of shared and
virtualized computing resources, such as storage, processing power, applications and …

Practical secure computation outsourcing: A survey

Z Shan, K Ren, M Blanton, C Wang - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …

Hosting services on an untrusted cloud

D Boneh, D Gupta, I Mironov, A Sahai - … on the theory and applications of …, 2015 - Springer
We consider a scenario where a service provider has created a software service S and
desires to outsource the execution of this service to an untrusted cloud. The software service …

[PDF][PDF] Secure outsourced computation in a multi-tenant cloud

S Kamara, M Raykova - IBM Workshop on Cryptography and Security in …, 2011 - cachin.com
We present a general-purpose protocol that enables a client to delegate the computation of
any function to a cluster of n machines in such a way that no adversary that corrupts at most …

[PDF][PDF] Towards Trusted Cloud Computing.

N Santos, KP Gummadi, R Rodrigues - HotCloud, 2009 - usenix.org
Towards Trusted Cloud Computing Page 1 Towards Trusted Cloud Computing Nuno Santos
Krishna P. Gummadi Rodrigo Rodrigues MPI-SWS Abstract Cloud computing infrastructures …

Guest editors' introduction: In cloud computing we trust-But should we?

A Ghosh, I Arce - IEEE security & privacy, 2010 - ieeexplore.ieee.org
The Guest Editors Introduction to the Special Issue on Cloud Computing Security presents
the economic benefits of cloud computing as well as the security and privacy risks inherent …

Security and privacy in the clouds: a bird's eye view

W Pieters - Computers, privacy and data protection: An element of …, 2011 - Springer
Over the last years, something called “cloud computing” has become a major theme in
computer science and information security. Essentially, it concerns delivering information …