A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems

 

 

 

home

 

people

 

documents

 

privacy preserving

search for nearest bank/ATM

 

implementation

 

license

 

code

 

acknowledgments

 

 

Papers

w

A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems

-

-

Sriram N. Premnath, Zygmunt J. Haas

The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC-2014), Invited Paper.

 

w

A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems (Extended Version)

-

-

Sriram N. Premnath, Zygmunt J. Haas

IEEE Transactions of Cloud Computing, 2014, in preparation.

 

 

Patents

w

System and Method for Secure and Verifiable Cloud Computing for Mobile Systems

-

-

Sriram N. Premnath, Zygmunt J. Haas

Provisional patent application filed with USPTO on 5/21/2014, Serial number 62/001,285.

 

 

Presentations and Talks

w

A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems

-

-

Slides

MobiSPC, August 17-20, 2014.

 

w

Privacy Preserving Search for the Nearest bank/ATM

-

-

Slides

WNL, Cornell University, April 11, 2014

 

w

Invited talks on "Big Data and Its Security Implications"

-

 

-

 

-

Z.J. Haas, National Taiwan University (NTU), Taipei, Taiwan, December 16, 2013

Z.J. Haas, National Sun Yat-sen University, Kaohsiung, Taiwan, December 18, 2013

Z.J. Haas, National Tsing Hua University, Hsinchu, Taiwan, December 19, 2013

 

w

Keynote speech on "Big Data and Its Security Implications"

-

Z.J. Haas, 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN13), Niagara Fall, Ontario, Canada, October 21-24, 2013

 

w

Invited talk on "Security of Big Data"

-

Z.J. Haas, Cornell Engineering Alumni Association conference, Washington, DC, May 13, 2013

 

w

Securing Big Data

-

-

Slides

WNL, Cornell University, October, 2013

 

w

Secure Cloud Computing

-

-

Slides

WNL, Cornell University, May, 2013

 

 

 

Programming Exercises

 

We have prepared education materials in the form of a series of 10 programming exercises to build our system. These education materials will also be very useful for professional software developers to build a commercial secure and verifiable cloud computing system.

 

w

Exercise 1: Garbled Table

w

Exercise 2: Garbled Circuit

 

w

Exercise 3: Addition of two 32-bit numbers

 

w

Exercise 4: Multiplication of two 32-bit numbers

 

w

Exercise 5: Modular Arithmetic, Hash Functions

 

w

Exercise 6: 1-out-of-2 Oblivious Transfer

 

w

Exercise 7: 1-out-of-4 Oblivious Transfer

 

w

Exercise 8: Secure Multiparty Computation (Goldreich's protocol)

-

Supplement to Exercise8

 

w

Exercise 9: Constructing Garbled Tables using Secure Multiparty Computation

-

Supplementary code for generating a Boolean circuit that creates garbled table entries

 

w

Exercise 10: Performance Evaluation of our Secure Cloud Computing System