Title :
The HEROIC Framework: Encrypted Computation Without Shared Keys
Author :
Tsoutsos, Nektarios Georgios ; Maniatakos, Michail
Author_Institution :
Dept. of Comput. Sci. & Eng., New York Univ., New York, NY, USA
Abstract :
Outsourcing computation to the cloud has recently become a very attractive option for enterprises and consumers, due to mostly reduced cost and extensive scalability. At the same time, however, concerns about the privacy of the data entrusted to cloud providers keeps rising. To address these concerns and thwart potential attackers, cloud providers today resort to numerous security controls as well as data encryption. Since the actual computation is still unencrypted inside cloud microprocessor chips, it is only a matter of time until new attacks and side channels are devised to leak sensitive information. To address the challenge of securing general-purpose computation inside microprocessor chips, we propose a novel computer architecture, and present a complete framework for general-purpose encrypted computation without shared keys, enabling secure data processing. This new architecture, called homomophically encrypted one instruction computation, contrary to the previous work in the area does not require a secret key installed inside the microprocessor chip. Instead, it leverages the powerful properties of homomorphic encryption combined with the simplicity of one instruction set computing. The proposed framework introduces: 1) a RTL implementation for reconfigurable hardware and 2) a ready-to-deploy virtual machine, which can be readily ported to existing server processor architectures.
Keywords :
computer architecture; cryptography; data privacy; microprocessor chips; outsourcing; HEROIC framework; RTL; cloud microprocessor chips; cloud providers; computer architecture; data encryption; data privacy; general-purpose computation; general-purpose encrypted computation; homomorphic encryption; homomorphically encrypted one instruction computation architecture; instruction set computing; outsourcing computation; secure data processing; security controls; server processor architectures; side channels; virtual machine; Computers; Encryption; Memory management; Microprocessor chips; Cloud computing; Encrypted processor; Paillier; cloud computing; encrypted processor; homomorphic encryption; one instruction set computer; one instruction set computer (OISC); virtualization;
Journal_Title :
Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on
DOI :
10.1109/TCAD.2015.2419619