Melek Ӧnen July 5th, 2016 – Lorient
Joint work with Monir Azraoui, Kaoutar Elkhiyaoui, Refik Molva
Verifiability for Cloud Storage and Computation Melek nen July 5th, - - PowerPoint PPT Presentation
Verifiability for Cloud Storage and Computation Melek nen July 5th, 2016 Lorient Joint work with Monir Azraoui, Kaoutar Elkhiyaoui, Refik Molva Cloud Outsourcing Storage and Computation Data storage Data processing [Cloud Security
Joint work with Monir Azraoui, Kaoutar Elkhiyaoui, Refik Molva
Company A Company B User
Data storage Data processing
Benefits
[Cloud Security Spotlight 2015]
Multi-tenancy
Melek Önen SEC2, July 5th 2016
No possession of resources
Malicious cloud
Cloud as a black box
Melek Önen SEC2, July 5th 2016
Melek Önen SEC2, July 5th 2016
Efficient setup & verification Limited number of verifications
Combination of blocks Tag aggregation Verification Upload Upload Verification
Efficient communication Costly tag generation
Tags
Melek Önen SEC2, July 5th 2016
6
[ESORICS 2014]
Melek Önen SEC2, July 5th 2016
Nonce PIR query for a watchdog
True False
PIR
Melek Önen SEC2, July 5th 2016
[Parno et al. 2012] [Parno et al. 2012]
Melek Önen SEC2, July 5th 2016
𝒈 𝒚 𝒛 𝑩 𝒀 = 𝒃𝒋𝒀𝒋 ∈ 𝔾𝒒[𝒀]
𝒆 𝒋=𝟏
𝒚 ∈ 𝔾𝒒 𝒛 = 𝑩 𝒚 ∈ 𝔾𝒒 𝑵. 𝒚 with 𝐍 = 𝑵𝒋𝒌 ∈ 𝔾𝒒
𝒐×𝒏
𝒚 = 𝒚𝟐, 𝒚𝟑, … , 𝒚𝒏 ⟙ ∈ 𝔾𝒒
𝒏
𝒛 = 𝒛𝟐, 𝒛𝟑, … , 𝒛𝒐 ⟙ = 𝑵𝒚 ∈ 𝔾𝒒
𝒐
𝒈 𝒚, 𝒈 𝒚 = ? Compute 𝒈 𝒚 and 𝚸 Verify 𝒚, 𝒛,
𝚸
𝒛 = 𝒈 𝒚 , 𝚸 Search(.) Keywords 𝕏 = {𝝏𝟐, 𝝏𝟑, … , 𝝏𝒐} ID of files 𝑮𝒋 such that 𝕏 ⊂ 𝑮𝒋
Melek Önen SEC2, July 5th 2016
[ASIACCS 2016] [SPC 2015]
Melek Önen SEC2, July 5th 2016
𝒆 𝒋=𝟏
𝒆−𝟑 𝒋=𝟏
Melek Önen SEC2, July 5th 2016
Melek Önen SEC2, July 5th 2016
Melek Önen SEC2, July 5th 2016
Melek Önen SEC2, July 5th 2016
Melek Önen SEC2, July 5th 2016
Kaoutar Elkhiyaoui, Melek Önen, Monir Azraoui, Refik Molva Efficient Techniques for Publicly Verifiable Delegation of Computation ASIACCS’16, Xi’an, China, May 31, 2016
𝒐 𝒋=𝟐
𝟐≤𝒌≤𝒏
𝒚𝒌 𝒏 𝒌=𝟐
𝒚𝒌 𝒏 𝒌=𝟐 𝒐 𝒋=𝟐
Kaoutar Elkhiyaoui, Melek Önen, Monir Azraoui, Refik Molva Efficient Techniques for Publicly Verifiable Delegation of Computation ASIACCS’16, Xi’an, China, May 31, 2016
𝒐 𝒋=𝟐
𝟐≤𝒌≤𝒏
Kaoutar Elkhiyaoui, Melek Önen, Monir Azraoui, Refik Molva Efficient Techniques for Publicly Verifiable Delegation of Computation ASIACCS’16, Xi’an, China, May 31, 2016
𝒚𝒌 𝒏 𝒌=𝟐
General functions Key size and proof generation linear with circuit size Efficient verification Construction of efficient aPRFs
Arithmetic circuit
QAP polynomials
Setup Setup
𝒈 𝒈 𝒃𝑸𝑺𝑮 𝒈, 𝒃𝑸𝑺𝑮 𝒈, 𝒃𝑸𝑺𝑮 𝒚, 𝒈 𝒚 = ?
Compute 𝒛 = 𝒈 𝒚 Compute 𝚸 = 𝒃𝑸𝑺𝑮(𝒈(𝒚))
𝒛, 𝚸
Verification 𝒃𝑸𝑺𝑮 𝒛 = 𝚸
QAP QAP
𝒚, 𝒈 𝒚 = ?
Evaluate circuit on 𝒚 → 𝒛 Proof with QAP polynomials → 𝚸
𝒛, 𝚸
Verification QAP verification based on 𝒛 and 𝚸
Scheme Upload Storage
Proof Generation Verification Communication Ateniese et
106 exp 106 mul 267 MB 103 PRP, 103 PRF 103 exp, 104 mul 104 exp 104 PRP 316 B Shacham and Waters 2008 106 PRF 109 mul 51 MB 104 mul 102 mul 3 KB Xu et al. 2012 108 mul 106 PRF 26 MB 102 exp 105 mul 104 mul 104 PRF 36 KB Juels and Kaliski 2007 106 PRF 30 MB N/A 104 PRP 33 MB StealthGuard 2014 105 PRF 105 PRP 8 MB 105 mul 106 mul 50 MB Lighter Smaller storage
Comparable Comparable More expensive but unbounded number of verifications
Melek Önen SEC2, July 5th 2016
𝒆 𝟑 - Strong Bilinear Diffie-Hellman assumption
1 𝛽+𝛾
Melek Önen SEC2, July 5th 2016