dc.contributor.author | Dijk, Marten van | |
dc.contributor.author | Devadas, Srinivas | |
dc.contributor.author | Fletcher, Christopher Wardlaw | |
dc.date.accessioned | 2015-11-23T14:52:17Z | |
dc.date.available | 2015-11-23T14:52:17Z | |
dc.date.issued | 2012-10 | |
dc.identifier.isbn | 9781450316620 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/99986 | |
dc.description.abstract | This paper considers encrypted computation where the user specifies encrypted inputs to an untrusted program, and the server computes on those encrypted inputs. To this end we propose a secure processor architecture, called Ascend, that guarantees privacy of data when arbitrary programs use the data running in a cloud-like environment (e.g., an untrusted server running an untrusted software stack).
The key idea to guarantee privacy is obfuscated instruction execution; Ascend does not disclose what instruction is being run at any given time, be it an arithmetic instruction or a memory instruction. Periodic accesses to external instruction and data memory are performed through an Oblivious RAM (ORAM) interface to prevent leakage through memory access patterns. We evaluate the processor architecture on SPEC benchmarks running on encrypted data and quantify overheads. | en_US |
dc.language.iso | en_US | |
dc.publisher | Association for Computing Machinery (ACM) | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1145/2382536.2382540 | en_US |
dc.rights | Creative Commons Attribution-Noncommercial-Share Alike | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/4.0/ | en_US |
dc.source | MIT web domain | en_US |
dc.title | A secure processor architecture for encrypted computation on untrusted programs | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Christopher W. Fletcher, Marten van Dijk, and Srinivas Devadas. 2012. A secure processor architecture for encrypted computation on untrusted programs. In Proceedings of the seventh ACM workshop on Scalable trusted computing (STC '12). ACM, New York, NY, USA, 3-8. | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
dc.contributor.mitauthor | Fletcher, Christopher Wardlaw | en_US |
dc.contributor.mitauthor | Devadas, Srinivas | en_US |
dc.relation.journal | Proceedings of the seventh ACM workshop on Scalable trusted computing (STC '12) | en_US |
dc.eprint.version | Author's final manuscript | en_US |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
eprint.status | http://purl.org/eprint/status/NonPeerReviewed | en_US |
dspace.orderedauthors | Fletcher, Christopher W.; Dijk, Marten van; Devadas, Srinivas | en_US |
dc.identifier.orcid | https://orcid.org/0000-0001-8253-7714 | |
dc.identifier.orcid | https://orcid.org/0000-0003-1467-2150 | |
mit.license | OPEN_ACCESS_POLICY | en_US |
mit.metadata.status | Complete | |