5 CONCLUSIONS
Cloud computing provides an adequate environment
for deploying applications following a Software-as-
a-Service (SaaS) model. However, security and
privacy are key concerns when sensitive data
managed by applications is moved to cloud
infrastructures for processing or storage.
In this paper we have proposed, as a case study
of a real-life secure cloud application, a spreadsheet
capable of performing DPED operations on cloud
servers. The application was tested on a private
cloud and on GAE, with analysis of the time
required to perform a ciphered FFT operation.
Although the test results demonstrate that
homomorphic encryption is a feasible solution for
secure data processing on cloud infrastructures, the
efficiency of current encrypted domain libraries
needs to be improved to achieve commercial status.
Nevertheless, although the times for encrypted
operations are quite long, they are satisfactory for
applications with a light processing load, such as the
proposed spreadsheet. To apply this model in a
PaaS, cloud providers should support DPED
libraries on their servers.
This solution could be applied to other real-life
applications, such as enterprise resource planning
(ERP) or e-Health SaaS, where confidentiality is
crucial.
ACKNOWLEDGEMENTS
This research was supported by the SAFECLOUD
grant (09TIC014CT), funded by Xunta de Galicia
(Spain), and partially supported by the HIGEA grant
(IPT-2012-1218-300000), funded by the Spanish
Ministry of Economy and Competitiveness, the
PRISMED grant (IPT-2011-1076-900000), funded
by the Spanish Ministry of Science and Innovation.
This research was conducted with the collaboration
of GPSC research group of the University of Vigo,
which provided the DPED libraries, and Fundación
Barrié.
REFERENCES
Adkinson-Orellana, L., Rodríguez-Silva, D. A., Gil-
Castiñeira, F., and Burguillo-Rial, J., 2010. Privacy for
Google Docs: Implementing aTransparent Encryption
Layer. In Proc. of 2nd Cloud Computing International
Conference–CloudViews 2010 (pp. 20-21).
Brickell, E. F., Yacobi, Y., 1987. On Privacy
Homomorphisms. In Advances in Cryptology–
EUROCRYPT 87 (pp. 117-125). Springer Berlin
Heidelberg.
Chan, A. F., 2009. Symmetric-key homomorphic
encryption for encrypted data processing. In
Communications, 2009. ICC'09. IEEE International
Conference on (pp. 1-5). IEEE.
CloudLock. [Online]. [Accessed 6 January 2015].
Available from: http://www.cloudlock.com/
CryptRoll.2013. [Online]. [Accessed 6 January 2015].
Available from: http://cryptroll.android.informer.com/
Data Protection Directive. [Online]. [Accessed 6 January
2015]. Available from: http://ec.europa.eu/justice/data.
protection/index_en.html.
European CIOs and Cloud Services, 2010. [Online].
[Accessed 6 January 2015]. Available from:
http://www.colt.net/cio-research.
Gentry, C., 2009.Fully Homomorphic Encryption Using
Ideal Lattices. In41st ACM Symposium on Theory of
Computing–STOC (Vol. 9, pp. 169-178).
Hacigümüş, H., Iyer, B., Li, C., and Mehrotra, S., 2002.
Executing SQL over encrypted data in the database-
service-provider model. In Proceedings of the 2002
ACM SIGMOD international conference on
Management of data (pp. 216-227). ACM.
LOPD, Ley orgánica 15/1999 de Protección de Datos de
Carácter Personal, Boletín Oficial del Estado (in
Spanish), 1999.[Online].[Accessed 6 January 2015].
Available from: https://www.boe.es/
Paillier, P. (1999). Public-key cryptosystems based on
composite degree residuosity classes. In Advances in
cryptology–EUROCRYPT’99 (pp. 223-238).Springer
Berlin Heidelberg.
RDLOPD, Real Decreto 1720/2007, Reglamento de
Desarrollo de la LOPD, BoletínOficialdel Estado (in
Spanish), 2007.[Online]. [Accessed 6 January 2015].
Availablefrom: https://www.boe.es/
Rodriguez-Silva, D. A., González-Castaño, F. J.,
Adkinson-Orellana, L., Fernández-Cordeiro, A.,
Troncoso-Pastoriza, J. R., and González-Martínez, D.,
2011. Encrypted Domain Processing for Cloud
Privacy. Concept and Practical Experience. In
Proceedings of 1st International Conference on Cloud
Computing and Services Science–CLOSER 2011.
Van Dijk, M., Gentry, C., Halevi, S., and Vaikuntanathan,
V., 2010. Fully homomorphic encryption over the
integers. In Advances in Cryptology–EUROCRYPT
2010 (pp. 24-43). Springer Berlin Heidelberg.
ZecurePC. 2011. [Online]. [Accessed 6 January 2015].
Available from: http://www.zecurex.com/.
CLOSER2015-5thInternationalConferenceonCloudComputingandServicesScience
520