erations are quite long, they are still satisfactory for
user applications with light processing load, such as
spreadsheets, and encrypted domain processing tech-
nology is expected to evolve rapidly. Let us recall that
the encrypted domain libraries were developed with
Java, as requested by Google App Engine, so they are
executed on a Java virtual machine.
5 CONCLUSIONS
In this paper we have presented a new model for se-
cure Cloud Computing, without any reliable entity
but the client itself, based on encrypted domain pro-
cessing. We have also presented a real implementa-
tion as a proof-of-concept, relying on Google App
Engine. Our results with basic arithmetic operations
indicate that the model is valid for user applications
in the Cloud with light server processing. As future
work we will develop a more complete user appli-
cation such as a spreadsheet to perform more com-
plex encrypted operations including vectorial ones.
To improve performance, we will consider the use of
threads, and remote ciphered operations will be exe-
cuted with a C version of the libraries through a JNI
interface.
ACKNOWLEDGEMENTS
This research was supported by the ACETIC con-
sortium and the SAFECLOUD grant (09TIC014CT),
funded by Xunta de Galicia, Spain. The work
was also partially supported by projects “Consoli-
dation of Research Units” (2010/85), SCALLOPS
(10PXIB322231PR) and VISAGE (10TIC008CT),
funded by Xunta de Galicia; by project COMON-
SENS (CSD2008-00010) of the CONSOLIDER-
INGENIO 2010 Program; and by the Spanish Min-
istry of Science and Innovation FPU grant AP2006-
02580.
REFERENCES
Adkinson-Orellana, L., Rodr
´
ıguez-Silva, Gil-Casti
˜
neira, F.
and Burguillo-Rial J. C. (2010). Privacy for Google
Docs: Implementing a transparent encryption layer.
In Proc. CloudViews 2010, p. 21–22, Porto, Portugal.
Ahituv, N., Lapid, Y., and Neumann, S. (1987). Process-
ing encrypted data. Communications of the ACM,
30(9):777–780.
Anderson, R., Bond, M., Clulow, J. and Skorobogatov, S.
(2006). Cryptographic processors - a survey. Pro-
ceedings of the IEEE 94 (2): p. 357–369.
Brickell, E. F. and Yacobi, Y. (1987). On privacy homomor-
phisms (extended abstract). In Proc. EUROCRYPT 87,
LNCS 304, p. 117–125.
Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J.,
Masuoka, R., and Molina, J. (2009). Controlling data
in the Cloud: outsourcing computation without out-
sourcing control. In Proc. CCSW ’09, p. 85–90, NY,
USA.
CSA (2010). Top Threats to Cloud Comput-
ing V1.0. Retrieved August 16, 2010 from
http://www.cloudsecurityalliance.org/topthreats/
csathreats.v1.0.pdf.
Doelitzscher, F., Reich, C. and Sulistio, A. (2010). Design-
ing Cloud services adhering to government privacy
laws. In Proc. TSP’10, Bradford, UK.
Europasur (2008). Gmail, el correo esp
´
ıa de Google,
ilegal en Europa. Retrieved August 16, 2010 from
http://www.europasur.es/article/sociedad/38601/gmail
/correo/espia/google/ilegal/europa.html.
Google (2010). Google App engine. Retrieved July 7, 2010
from http://code.google.com/appengine.
Itani, W., Kayssi, A. and Chehab, A. (2009). Privacy as a
service: Privacy-aware data storage and processing in
Cloud Computing architectures. In Proc. Int. Work-
shop on SCC’09, p. 12–14, Chengdu, China.
Jensen, M., Schwenk, J., Gruschka, N. and Lo Iacono, L.
(2009). On technical security issues in Cloud Com-
puting. In Proc. CLOUD ’09, p. 109–116, Bangalore,
India.
Kamara, S. and Lauter, K. (2010). Cryptographic Cloud
storage. In Workshop on Real-Life Cryptographic Pro-
tocols and Standardization 2010.
Pearson, S., Shen, Y., and Mowbray, M. (2009). A privacy
manager for Cloud Computing. In Cloud Computing,
LNCS 5931, p. 90–106..
Rivest, R., Adleman, L. and Dertouzos, M. (1978). On data
banks and privacy homomorphisms. In Foundations
of Secure Computation, p. 169–177. Academic Press.
Sartor, G. and Viola de Azevedo Cunha, M. (2010). The
Italian Google-Case: Privacy, Freedom of Speech and
Responsibility of Providers for User-Generated Con-
tents. Oxford University Press.
Tian, X., Wang, X. and Zhou, A. (2009). DSP re-
encryption: A flexible mechanism for access control
enforcement management in DaaS. In Proc. CLOUD
’09, p. 25–32, Bangalore, India.
Troncoso-Pastoriza, J. R., Comesa
˜
na, P., and P
´
erez-
Gonz
´
alez, F. (2009). Secure direct and iterative pro-
tocols for solving systems of linear equations. In
Proc. SPEED Workshop 2009, p. 122–141, Lausanne,
Switzerland.
Troncoso-Pastoriza, J. R., Katzenbeisser, S., and Celik, M.
(2007). Privacy preserving error resilient DNA search-
ing through oblivious automata. In Proc. 14th ACM
Conference on Computer and Communications Secu-
rity, p. 519–528, Alexandria, Virginia, USA.
Troncoso-Pastoriza, J. R., P
´
erez-Gonz
´
alez, F. (2010). Cryp-
toDSPs for Cloud Privacy. In Proc. Int. Workshop on
CISE 2010, LNCS, Hong Kong, China.
Yao, A. C. (1982). Protocols for secure computations. In
Proc. IEEE Symposium on Foundations of Computer
Science, p. 160–164.
CLOSER 2011 - International Conference on Cloud Computing and Services Science
596