Attack on a Scheme for Obfuscating and Outsourcing SAT Computations to the Cloud

Khazam Alhamdan, Tassos Dimitriou, Imtiaz Ahmad

Abstract

The emergence of cloud computing gave users the capability to offload computations that cannot be executed locally to cloud servers with large computational power. One such computationally demanding problem is solving large satisfiability (SAT) instances. Although many problems from AI, circuit verification, etc. can be converted to SAT, outsourcing SAT instances may leak considerable information that can put a user’s security at risk. Hence the privacy of outsourcing computations to the cloud is a major issue. In this work we look at the techniques of Qin et al. (Qin and Jia., 2014; Qin and Du., 2018) which have been used to obfuscate SAT formulas before they are released to the cloud. We came up with a realistic attack against their technique that demonstrates how a malicious cloud provider can obtain significant information about the underlying SAT instance. Our work shows that ad hoc schemes cannot offer the required security guarantees for outsourcing SAT computations, hence more formal frameworks should be used instead.

Download


Paper Citation


in Harvard Style

Alhamdan K., Dimitriou T. and Ahmad I. (2019). Attack on a Scheme for Obfuscating and Outsourcing SAT Computations to the Cloud.In Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT, ISBN 978-989-758-378-0, pages 356-362. DOI: 10.5220/0007829503560362


in Bibtex Style

@conference{secrypt19,
author={Khazam Alhamdan and Tassos Dimitriou and Imtiaz Ahmad},
title={Attack on a Scheme for Obfuscating and Outsourcing SAT Computations to the Cloud},
booktitle={Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT,},
year={2019},
pages={356-362},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0007829503560362},
isbn={978-989-758-378-0},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 16th International Joint Conference on e-Business and Telecommunications - Volume 2: SECRYPT,
TI - Attack on a Scheme for Obfuscating and Outsourcing SAT Computations to the Cloud
SN - 978-989-758-378-0
AU - Alhamdan K.
AU - Dimitriou T.
AU - Ahmad I.
PY - 2019
SP - 356
EP - 362
DO - 10.5220/0007829503560362