The Beginnings of Encrypted Computing In the Cloud 76
eldavojohn writes "A method of computing from a 2009 paper allows the computing of data without ever decrypting it. With cloud computing on the rise, this may be the holy grail of keeping private data private in the cloud. It's called Fully Homomorphic Encryption, and if you've got the computer science/mathematics chops you can read the thesis (PDF). After reworking it and simplifying it, researchers have moved it away from being true, fully homomorphic encryption, but it is now a little closer to being ready for cloud usage. The problem is that the more operations performed on your encrypted data, the more likely it has become 'dirty' or corrupted. To combat this, Gentry developed a way to periodically clean the data by making it self-correcting. The article notes that although this isn't prepared for use in reliable systems, it is a quick jump to implementation just one year after the paper was published — earlier encryption papers would take as much as half a decade until they were implemented at all."
Re: (Score:2)
svefg cbfg
FYP
Can't come soon enough (Score:1)
I never did see the big draw of cloud computing without this. Hopefully this will also provide some needed knowledge to better something like Freenet [freenetproject.org]
Freenet is clever (Score:1, Insightful)
I am a Freenet user (posting anonymously for obvious reasons) and I use it for Freenet Messaging System (FMS) which is a web forums on top of Freenet. The key thing about Freenet is that it is an anonymous data store. Even if you are offline, someone can fetch the data that is spinning around in the network.
You use a lot of CPU in my experience to retransmit lots of requests from other users, it's not obvious to your node whether or not you actually requested a piece of data. Even better is to make a darkne
Anonymous != untrustworthy (Score:2)
Anonymous does not necessarily mean "has no name", although I can see how slashdotters are being conditioned to think so. Anonymous merely means to keep ones identities separate from and unconnected to one another.
You can have a perfectly anonymous identity with assorted social perks such as a recognizable name and verifiability/accountability; just disconnected from any other identities you might have. The tricky part is *keeping* them separated (plain human sloppiness is what got most old-school hackers c
Re: (Score:2)
Actually anonymous implies no attached name, or name-like construct. If there is an attached name, then it is pseudonymous.
um, no. (Score:5, Interesting)
Practical homomorphic encryption is a fantasy, or at the very least it is so far off that it won't impact any of us any time soon.
If you want to cloudsource sensitive information processing, you will need a highly-secured vendor (most aren't even close). Sorry!
Re: (Score:3, Insightful)
Practical homomorphic encryption is a fantasy,
So what about impractical, if they can get it to work impractically, isn't it just a matter of resources playing catchup?
Security is NOT an issue with The Cloud. (Score:3, Funny)
Wait a minute. I'm a manager, and I've been reading a lot of case studies and watching a lot of webcasts about The Cloud. Based on all of this glorious marketing literature, I, as a manager, have absolutely no reason to doubt the safety of any data put in The Cloud.
The case studies all use words like "secure", "MD5", "RSS feeds" and "encryption" to describe the security of The Cloud. I don't know about you, but that sounds damn secure to me! Some Clouds even use SSL and HTTP. That's rock solid in my book.
An
Re: (Score:2)
Practical homomorphic encryption is a fantasy
Anybody else first misread that as "homophobic" then "homoerotic" fantasy? :)
Re: (Score:1, Funny)
nope. just you.
awkward, right?
Re: (Score:2)
I hate to break it to you, Mr. Coward, but we would need a deluge of breakthroughs before it is even remotely interesting from an engineering standpoint.
Re: (Score:2)
Practical homomorphic encryption is a fantasy,
Not that there is anything wrong with it.
Re: (Score:2)
Practical homomorphic encryption is a fantasy, or at the very least it is so far off that it won't impact any of us any time soon.
So how many years to deployment is that? Three? Five? Ten?
Re: (Score:3, Insightful)
Re: (Score:2, Insightful)
I'm glad to see that another Slashdotter actually understands what this work is about, because most of the commenters on this thread are clueless.
This work is fascinating because the author's encryption scheme is homomorphic for both multiplicative and additive operations, allowing you to compute arbitrary boolean circuits on the encrypted data!
Unfortunately, the computational complexity of their approach is too slow for this to have any practical applications (due to some astoundingly complicated "gadgets"
Just Use Fusion/OpenCL (Score:2)
That's easy. (Score:2)
Encrypted data manipulation? Just write the manipulation software in Malbolge.
maybe it's just me (Score:4, Insightful)
The idea that my data is on the "cloud" and I have to pay a monthly fee (or watch some ads) to access it is really not very interesting to me.
Re: (Score:2)
maybe it's just you. (Score:1)
The idea that my grandmother's data is on her own equipment that she has no idea how to operate and is at risk of becoming a spambot-zombie isn't all that interesting to me either.
Also, are we talking about enterprise cloud or consumer cloud with this article?
Re: (Score:2)
by the sound of it, consumer cloud is just enterprise cloud scaled down.
Re: (Score:2)
Re: (Score:2)
I doubt it, but she'll probably end up using it anyway, whether she knows or not.
Re: (Score:2)
And I feel exactly the same way about storage places, and yet people pay monthly to store things that they really should be selling or giving away.
Short-term storage I understand. People who have had that storage unit for more than a year just amaze me. You could throw it all away and buy it again for the same price. And if it's -really- precious to you, it shouldn't be in storage in the first place.
Re: (Score:2)
As a consumer, sure. As a business, you'll eventually want secure offsite storage for both paper and electronic records, and you'll expect to pay monthly for both. You might want to throw that stuff out, but there are all these annoying laws about record retention.
Re: (Score:2)
Re: (Score:2, Insightful)
So I'm guessing you aren't using hosted email in any way. If you are, your email data is "in the cloud". Another excellent use of the cloud is for system backups (note I work for a company that provides secure system backups to our cloud storage). One of the few "reliable" ways of keeping up-to-date point-in-time backups of systems for disaster recovery is by using secure cloud storage. Every other method that I've investigated has serious (and often fatal) flaws to keeping a recoverable image of critic
Re: (Score:2)
The idea that my data is on the "cloud" and I have to pay a monthly fee (or watch some ads) to access it is really not very interesting to me.
I see your point, but it's not like maintaining your own physical computer is free either. Instead of paying service fees, you have to pay money to purchase the computer, spend time and/or money to keep it running, make sure your data is backed up, pay for electricity, deal with it if it gets stolen or damaged, etc.
The trade-offs may be worth it for you, but other pe
Re: (Score:2)
Re: (Score:3, Insightful)
So, tests are left out in the cold? (Score:2)
Re: (Score:1)
Re: (Score:2)
If I can sort your data alphabetically without the password, it's (as a result of that sorting) not usefully encrypted. I've read through some of this stuff and I just don't get it.
Re: (Score:2)
I havn't read it yet, but I'd assume you're not actually getting a sort command, you're getting a bunch of low level commands that end up making it sorted.
Re: (Score:3, Insightful)
The computed results don't reveal the inputs! (Score:3, Insightful)
If you can sort your data by plaintext, while still in ciphertext form (ie, without decrypting it on the cloud's hardware AT ALL), then what's stopping your cloud provider from doing it, too?
Nothing. The result will be a list of ciphertexts which won't reveal anything about the plaintexts.
See also the thesis, page 5 (5 on paper, 15 in pdf):
At a high-level, the essence of fully homomorphic encryption is simple: given ciphertexts that encrypt pi_1, ..., p_t fully homomorphic encryption should allow anyone (not just the key-holder) to output a ciphertext that encrypts f(pi_1, ..., p_t) for any desired function f, as long as that function can be efficiently computed. No information about pi_1, ..., p_t or ..., pi_t), or any intermediate plaintext values, should leak; the inputs, output and intermediate values are always encrypted.
f(pi_1,
So if I give you pi_1 and pi_2, you'll know that E(min(pi_1, pi_2)) = 42 and E(max(pi_1, pi_2)) = 17. What do their encryptions tell you about pi_1 and pi_2?
You're leaking information about your data to your provider, and if they wanted to, they could perform a process of elimination and discover your plaintext.
I don't think it's possible; I must admit I haven't read Gentry's thesis, but I assume he proves what he advertises---that he has a fully homomorphic encryption scheme. In that case, it is indeed possi
Re: (Score:2)
If I have a list of cyphertexts in plaintext-sorted-order, and I can choose several such operations to perform, I have more than enough information to decrypt most of it with high confidence.
Basically, if I can see the result of subtracting one plaintext from another (or XORing them together or any other such simple operaiton), I'm a trivial step away from decrypting both. This looks an awful lot like being able to get that information - not quite so neatly packaged, but close enough for government work.
Re: (Score:2)
Could you encrypt the algorithm itself? That is, just like you use the key to transform the cleartext to ciphertext, you would use the key to transfer the original algori
Re: (Score:2)
Re: (Score:1)
1931 called (Score:2)
What about just using encfs and fuse? (Score:3, Interesting)
Re: (Score:3, Insightful)
The intent is that the cloud provider, who doesn't have the password, could perform useful operations on your data. I don't see how anything good could come from this.
No that wouldn't allow them to analyze your data. (Score:2)
The whole point of cloud computing is to give corporations access to all your files and all your computing behavior so they can analyze it, sell it, broadcast it, trade it, and make it into a product for governments and corporations around the world.
Re: (Score:1, Insightful)
The whole point of cloud computing is to give corporations access to all your files and all your computing behavior so they can analyze it, sell it, broadcast it, trade it, and make it into a product for governments and corporations around the world.
Where do you get that from?
It seems as though you are thinking about the wrong layer of the 'cloud'.
This is about high availability, to where the hardware operators can have many servers on standby and seemlessly (via VMotion or similar technologies) change hardware without a hiccup. If a node goes down then just bring up the same resource on an alternate server.
Re:What about just using encfs and fuse? (Score:4, Insightful)
Not going to work (Score:3, Interesting)
This has been tried for at least 3 decades. It could never be made to work efficiently and this approach is also not really going to help. It may have some valid crypto application this time (it never got that far before), but you will have to pump in so many more CPU cycles, that it will be a lot cheaper to just spend then directly on you own PC for any non-crypto stuff.
Side note: The things people will claim to make this mostly BS idea of the cloud seem to work never cease to amaze me.
Cloud computing sells crypto research, not vv (Score:2)
Side note: The things people will claim to make this mostly BS idea of the cloud seem to work never cease to amaze me.
If I know anything about \subsection{Motivation}, they're using cloud computing to make fully homomorphic encryption seem* worthwhile.
(* appearances may be true or false but not both).
Academic cryptography has developed the theory necessary for all the important problems people want solved in practice (i.e. public key encryption). That's why we work on the (apparently) less important problems now, and that's why the "motivation" part of our articles are a little... stretched ;-)
You can argue that someone o
Encryption is only 1 problem (Score:1)
Newer Advance / Stop the Botnets (Score:3, Interesting)
There's been some progress [taragana.com] since this paper.
It's not there yet, but there's hope.
The good news is this will eventually stop the botnets. One all that computing power is reliably usable, there's profit motive to defend it.
Re: (Score:2)
Time for an eye exam (Score:2)
Preprint (Score:3, Interesting)
That article says this is possible (Score:2)
Quoting from your linked article:
Single-client private computing is realizable via FHE, as we explain below
FHE is Fully Homomorphic Encryption, exactly what Gentry has shown to exist.
(Note, I haven't read your linked article fully, nor have I read Gentry's thesis fully; I may be wrong, but a first guess would suggest that your linked article isn't in conflict with Gentry).