首页> 外文学位 >Static Analysis and Program Transformation for Secure Computation on the Cloud
【24h】

Static Analysis and Program Transformation for Secure Computation on the Cloud

机译:静态分析和程序转换,可在云上安全计算

获取原文
获取原文并翻译 | 示例

摘要

In the past decade, cloud computing service has become very popular and been widely studied and used in both academia and industry. The advantages of cloud computing model are obvious: high computation power, low cost of service, and ease of deployment and maintenance. Typically, customers upload data and/or application programs to cloud service platforms. However, as cloud service platforms are usually public and open to all customers, private data on the cloud faces severe security challenges in the process of computation, storage and communication. Data breach can cause significant and irreversible losses to individuals and organizations. As a result, cloud data security has become an increasingly important and attractive topic for cloud service customers, system architects, software developers, and researchers.;This dissertation presents an approach to analyze and transform Java programs to operate over encrypted data. The approach makes use of partially homomorphic encryption and a trusted client. We propose two systems, JCrypt and SecureMR, which use different analysis techniques and target different applications.;JCrypt is capable of analyzing arbitrary Java programs and minimizes computation over encrypted data. It performs two stages of analysis on Java programs to minimize the encrypted computing and identify encryption schemes for sensitive data. The static analysis techniques in JCrypt include a type-based information flow analysis and an "Available Expressions'' data-flow analysis.;SecureMR targets the widely used MapReduce models and makes use of Reaching definitions analysis. The analysis result is used to infer the encryption scheme for each column of data and the optimal placement of conversions. SecureMR also comprises a cost model to further optimize the program partitioning. The experimental evaluation on a set of complex computation-intensive MapReduce benchmarks demonstrate the transformed MapReduce programs can execute efficiently and effectively with reasonable overhead.
机译:在过去的十年中,云计算服务已变得非常流行,并且在学术界和行业中都得到了广泛的研究和使用。云计算模型的优点是显而易见的:高计算能力,低服务成本以及易于部署和维护。通常,客户将数据和/或应用程序上载到云服务平台。但是,由于云服务平台通常是公共的并且向所有客户开放,因此云上的私有数据在计算,存储和通信过程中面临严峻的安全挑战。数据泄露会给个人和组织造成重大且不可挽回的损失。因此,云数据安全已成为云服务客户,系统架构师,软件开发人员和研究人员越来越重要和有吸引力的话题。本文为分析和转换Java程序以对加密数据进行操作提供了一种方法。该方法利用了部分同态加密和受信任的客户端。我们提出了两种系统,即JCrypt和SecureMR,它们使用不同的分析技术并针对不同的应用程序。JCrypt能够分析任意Java程序并最大程度地减少对加密数据的计算。它对Java程序执行两个分析阶段,以最小化加密计算并确定敏感数据的加密方案。 JCrypt中的静态分析技术包括基于类型的信息流分析和“可用表达式”数据流分析。; SecureMR以广泛使用的MapReduce模型为目标,并利用Reaching定义分析。每个数据列的加密方案和最佳转换位置SecureMR还包括一个成本模型以进一步优化程序分区对一组复杂的计算密集型MapReduce基准进行的实验评估表明,转换后的MapReduce程序可以高效执行合理的开销。

著录项

  • 作者

    Dong, Yao.;

  • 作者单位

    Rensselaer Polytechnic Institute.;

  • 授予单位 Rensselaer Polytechnic Institute.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2017
  • 页码 116 p.
  • 总页数 116
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号