Now Reading
MIT researchers advance cloud security with end-to-end encyrption

MIT researchers advance cloud security with end-to-end encyrption

Crypto_key.svg
Cryptographically secure pseudorandom number generator (Photo credit: Wikipedia)

University researchers have taken an important step forward on cloud security by proving it’s possible for a server to process encrypted data and to send back a still-encrypted result.

The technique, developed at the Massachusetts Institute of Technology (MIT), is based on homomorphic encryption, which makes it possible for a cloud server to process data without decryption.

The new method involves stitching homomorphic encryption with two other techniques into what the researchers call a “functional-encryption scheme.” The technique is not ready for prime time. The researchers acknowledge that it requires too much computational power to be practical.
Nevertheless, that problem can be attacked over time, now that researchers know it is possible to process data without decryption. “Before, we didn’t even know if this was possible,” said Raluca Ada Popa, a coauthor of the research and a graduate student in the Department of Electrical Engineering and Computer Science at MIT.

With today’s technology, if an encrypted search term is not decrypted first, then the receiving server has no choice but to send back information on every database record it has. As a result, the recipient’s computer would then have to do the decryption and handle the computations necessary to determine the applicable results.
Homomorphic encryption, a promising research topic in cryptography, makes it possible to process data while maintaining end-to-end encryption. The researchers’ new functional-encryption scheme takes that technology a step further by enabling the cloud server to run a single, specified computation on the homomorphically encrypted result — such as, “Is this record a match?” — without having to extract any other information.

[In depth: End-to-end encryption: The PCI security Holy Grail]

To do that, the researchers used two other schemes, called garbled circuit and attribute-based encryption. Each has select capabilities necessary for functional encryption.

The new system begins with homomorphic encryption and embeds the decryption algorithm in a garbled circuit. The key to the garbled circuit is protected in turn by attribute-based encryption, which keeps the whole process encrypted.

Steve Pate, co-founder and chief technology officer for cloud encryption company HighCloud Security, said the new research was “encouraging.” But he noted a big stumbleblock: “The computation required for homomorphic encryption far exceeds what we have today in terms of computing resources.”

See Also

Before such a technique can work, there will need to be advances in hardware where the encryption and key management capabilities occur within the processor or other hardware module, he said.

Read more . . .

 

The Latest Bing News on:
Cloud security
The Latest Google Headlines on:
Cloud security

[google_news title=”” keyword=”cloud security” num_posts=”10″ blurb_length=”0″ show_thumb=”left”]

The Latest Bing News on:
Homomorphic encryption
The Latest Google Headlines on:
Homomorphic encryption

[google_news title=”” keyword=”homomorphic encryption” num_posts=”10″ blurb_length=”0″ show_thumb=”left”]

What's Your Reaction?
Don't Like it!
0
I Like it!
0
Scroll To Top