ABSTRACT
In a common use case for cloud computing, clients upload data and computation to servers that are managed by a third-party infrastructure provider. We describe MrCrypt, a system that provides data confidentiality in this setting by executing client computations on encrypted data. MrCrypt statically analyzes a program to identify the set of operations on each input data column, in order to select an appropriate homomorphic encryption scheme for that column, and then transforms the program to operate over encrypted data. The encrypted data and transformed program are uploaded to the server and executed as usual, and the result of the computation is decrypted on the client side. We have implemented MrCrypt for Java and illustrate its practicality on three standard benchmark suites for the Hadoop MapReduce framework. We have also formalized the approach and proven several soundness and security guarantees.
- F. Ahmad, S. Lee, M. Thottethodi, and T. Vijaykumar. Puma: Purdue mapreduce benchmarks suite. Technical Report TR-ECE-12--11, School of Electrical and Computer Engineering, Purdue University, 2012. URL http://docs.lib.purdue.edu/ecetr/437/.Google Scholar
- O. Baudron, D. Pointcheval, and J. Stern. Extended notions of security for multicast public key cryptosystems. In phICALP '00, volume 1853 of phLecture Notes in Computer Science, pages 499--511. Springer, 2000. Google ScholarDigital Library
- M. Bellare, T. Kohno, and C. Namprempre. Authenticated encryption in ssh: provably fixing the ssh binary packet protocol. In phCCS '02, pages 1--11. ACM, 2002. Google ScholarDigital Library
- M. Bellare, T. Ristenpart, P. Rogaway, and T. Stegers. Format-preserving encryption. In phSelected Areas in Cryptography, volume 5867 of phLecture Notes in Computer Science, pages 295--312. Springer, 2009. Google ScholarDigital Library
- A. Boldyreva, N. Chenette, Y. Lee, and A. O'Neill. Order-preserving symmetric encryption. In phEUROCRYPT, volume 5479 of phLecture Notes in Computer Science, pages 224--241. Springer, 2009. Google ScholarDigital Library
- A. Boldyreva, N. Chenette, and A. O'Neill. Order-preserving encryption revisited: Improved security analysis and alternative solutions. In phCRYPTO, volume 6841 of phLecture Notes in Computer Science, pages 578--595. Springer, 2011. Google ScholarDigital Library
- C. Castelluccia, E. Mykletun, and G. Tsudik. Efficient aggregation of encrypted data in wireless sensor networks. In phProceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MOBIQUITOUS '05, pages 109--117, Washington, DC, USA, 2005. IEEE Computer Society. ISBN 0--7695--2375--7. 10.1109/MOBIQUITOUS.2005.25. URL http://dx.doi.org/10.1109/MOBIQUITOUS.2005.25. Google ScholarDigital Library
- J. Daemen and V. Rijmen. phThe design of Rijndael: AES-the advanced encryption standard. Springer, 2002. Google ScholarDigital Library
- J. Dean and S. Ghemawat. MapReduce: a flexible data processing tool. phCommun. ACM, 53 (1): 72--77, 2010. Google ScholarDigital Library
- T. ElGamal. A public-key cryptosystem and a signature scheme based on discrete logarithms. phIEEE Transactions on Information Theory, 31 (4): 469--472, 1985. Google ScholarDigital Library
- J. Foster, R. Johnson, J. Kodumal, and A. Aiken. Flow-insensitive type qualifiers. phACM Trans. Program. Lang. Syst., 28 (6): 1035--1087, Nov. 2006. Google ScholarDigital Library
- C. Fournet, J. Planul, and T. Rezk. Information-flow types for homomorphic encryptions. In phProceedings of the 18th ACM conference on Computer and communications security, CCS '11, pages 351--360. ACM, 2011. Google ScholarDigital Library
- T. Ge and S. Zdonik. Answering aggregation queries in a secure system model. In phProceedings of the 33rd international conference on Very large data bases, pages 519--530. VLDB Endowment, 2007. Google ScholarDigital Library
- C. Gentry. Fully homomorphic encryption using ideal lattices. In phSTOC 09: Symposium on Theory of Computing. ACM, 2009. Google ScholarDigital Library
- C. Gentry. Computing arbitrary functions of encrypted data. phCommun. ACM, 53 (3): 97--105, 2010. Google ScholarDigital Library
- C. Gentry and S. Halevi. Implementing Gentry's fully-homomorphic encryption scheme. In phEUROCRYPT 11, volume 6632 of phLecture Notes in Computer Science, pages 129--148. Springer, 2011. Google ScholarDigital Library
- S. Goldwasser and S. Micali. Probabilistic encryption. phJ. Computer and Systems Sciences, 28: 270--299, 1984.Google ScholarCross Ref
- S. Halevi and P. Rogaway. A tweakable enciphering mode. phAdvances in Cryptology-CRYPTO 2003, pages 482--499, 2003.Google Scholar
- M. Hirt and K. Sako. Efficient receipt-free voting based on homomorphic encryption. In phProceedings of the 19th international conference on Theory and application of cryptographic techniques, EUROCRYPT'00, pages 539--556, Berlin, Heidelberg, 2000. Springer-Verlag. ISBN 3--540--67517--5. URL http://dl.acm.org/citation.cfm?id=1756169.1756222. Google ScholarDigital Library
- E. Kowalski. Insider threat study: Illicit cyber activity in the information technology and telecommunications sector. Technical report, Technical report, U.S. Secret Service and Carnegie Mellon University, 2008. URL http://www.secretservice.gov/$\sim$ntac/final\_it\_sector\_2008\_0109.pdf.Google Scholar
- M. Lesani, R. Majumdar, T. Millstein, and S. Tetali. MrCrypt: Static analysis for secure cloud computations (technical report). Technical Report 130012, UCLA Computer Science Department, July 2013.Google Scholar
- J. Li, M. Krohn, D. Mazières, and D. Shasha. Secure untrusted data repository (sundr). In phOSDI 04: Operating Systems Design and Implementation, pages 91--106. ACM, 2004. Google ScholarDigital Library
- P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi, M. Dahlin, and M. Walfish. Depot: Cloud storage with minimal trust. In phOSDI 10: Operating Systems Design and Implementation. ACM, 2010. Google ScholarDigital Library
- J. Mitchell, R. Sharma, D. Stefan, and J. Zimmerman. Information-flow control for programming on encrypted data. In phComputer Security Foundations Symposium (CSF), 2012 IEEE 25th, pages 45--60. IEEE, 2012. Google ScholarDigital Library
- M. Naehrig, K. Lauter, and V. Vaikuntanathan. Can homomorphic encryption be practical? In phProceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW '11, pages 113--124, New York, NY, USA, 2011. ACM. ISBN 978--1--4503--1004--8. 10.1145/2046660.2046682. URL http://doi.acm.org/10.1145/2046660.2046682. Google ScholarDigital Library
- N. Nystrom, M. Clarkson, and A. Myers. Polyglot: An extensible compiler framework for java. In phCompiler Construction, pages 138--152. Springer, 2003. Google ScholarDigital Library
- C. Olston, B. Reed, U. Srivastava, R. Kumar, and A. Tomkins. Pig latin: a not-so-foreign language for data processing. In phProceedings of the 2008 ACM SIGMOD international conference on Management of data, SIGMOD '08, pages 1099--1110, New York, NY, USA, 2008. ACM. ISBN 978--1--60558--102--6. 10.1145/1376616.1376726. URL http://doi.acm.org/10.1145/1376616.1376726. Google ScholarDigital Library
- P. Ørbæk and J. Palsberg. Trust in the λ-calculus. phJournal of Functional Programming, 7 (6): 557--591, Nov. 1997. Google ScholarDigital Library
- P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In phEUROCRYPT 99: Theory and Applications of Cryptographic Techniques, 1999. Google ScholarDigital Library
- B. Parno, J. McCune, D. Wendlandt, D. Andersen, and A. Perrig. CLAMP: Practical prevention of large-scale data leaks. In phProceedings of the 2009 30th IEEE Symposium on Security and Privacy, SP '09, pages 154--169, Washington, DC, USA, 2009. IEEE Computer Society. ISBN 978-0--7695--3633-0. 10.1109/SP.2009.21. URL http://dx.doi.org/10.1109/SP.2009.21. Google ScholarDigital Library
- A. Pavlo, E. Paulson, A. Rasin, D. Abadi, D. DeWitt, S. Madden, and M. Stonebraker. A comparison of approaches to large-scale data analysis. In phProceedings of the 35th SIGMOD international conference on Management of data, pages 165--178. ACM, 2009. Google ScholarDigital Library
- R. Popa, C. Redfield, N. Zeldovich, and H. Balakrishnan. CryptDB: protecting confidentiality with encrypted query processing. In phProceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pages 85--100. ACM, 2011. Google ScholarDigital Library
- M. Raykova, B. Vo, S. Bellovin, and T. Malkin. Secure anonymous database search. In phCCSW 09: Cloud Computing Security Workshop, pages 115--126. ACM, 2009. Google ScholarDigital Library
- R. Rivest, L. Adleman, and M. Dertouzos. On data banks and privacy homomorphisms. In phFoundations of Secure Computation, pages 169--179. Academic Press, 1978.Google Scholar
- I. Roy, S. Setty, A. Kilzer, V. Shmatikov, and E. Witchel. Airavat: Security and privacy for MapReduce. In phNSDI, pages 297--312. USENIX, 2010. Google ScholarDigital Library
- A. Sabelfeld and A. C. Myers. Language-based information-flow security. phIEEE Journal on Selected Areas in Communications, 21 (1): 5--19, 2003. Google ScholarDigital Library
- T. Sander, A. Young, and M. Yung. Non-interactive cryptocomputing for NC$^1$. In phFOCS 99: Foundations of Computer Science. IEEE, 1999. Google ScholarDigital Library
- N. Santos, R. Rodrigues, K. Gummadi, and S. Saroiu. Policy-sealed data: A new abstraction for building trusted cloud services. In phUsenix Security Symposium. USENIX Association, 2012. Google ScholarDigital Library
- B. Schneier. Description of a new variable-length key, 64-bit block cipher (blowfish). In phFast Software Encryption, pages 191--204. Springer, 1994. Google ScholarDigital Library
- B. Schneier. phApplied cryptography. Wiley, 2nd edition, 1996.Google Scholar
- J. Vaughan. Auraconf: a unified approach to authorization and confidentiality. In phProceedings of the 7th ACM SIGPLAN workshop on Types in language design and implementation, TLDI '11, pages 45--58, New York, NY, USA, 2011. ACM. ISBN 978--1--4503-0484--9. 10.1145/1929553.1929563. URL http://doi.acm.org/10.1145/1929553.1929563. Google ScholarDigital Library
- A. Wright and M. Felleisen. A syntactic approach to type soundness. phInformation and Computation, 115 (1): 38--94, 1994. Google ScholarDigital Library
- A. Yao. How to generate and exchange secrets. In phFOCS 86: Foundations of Computer Science, pages 162--167. IEEE, 1986. Google ScholarDigital Library
Index Terms
- MrCrypt: static analysis for secure cloud computations
Recommendations
MrCrypt: static analysis for secure cloud computations
OOPSLA '13In a common use case for cloud computing, clients upload data and computation to servers that are managed by a third-party infrastructure provider. We describe MrCrypt, a system that provides data confidentiality in this setting by executing client ...
A Pairing-based Homomorphic Encryption Scheme for Multi-User Settings
A new method is presented to privately outsource computation of different users. As a significant cryptographic primitive in cloud computing, homomorphic encryption HE can evaluate on ciphertext directly without decryption, thus avoid information ...
An efficient and secure data sharing framework using homomorphic encryption in the cloud
Cloud-I '12: Proceedings of the 1st International Workshop on Cloud IntelligenceDue to cost-efficiency and less hands-on management, data owners are outsourcing their data to the cloud which can provide access to the data as a service. However, by outsourcing their data to the cloud, the data owners lose control over their data as ...
Comments