Academia.eduAcademia.edu

Outline

Secure outsourcing of some computations

1996

Abstract

Abstract The rapid growth of the Internet facilitates the outsourcing of certai. n computations, in the following sense: A customer who needs these computations done on some data but lacks the computational resources (or programming expertise) to do so, can use an external agent to perform these computations. This currently arises in many practical situations, including the financial services and petroleum services industries.

References (18)

  1. Alfred V. Aho, John E. Hopcroft, and Jeffrey D. Ullman. The Design and Analysis of Computer Algorithms. Addison-Wesley, 1974.
  2. M. Abadi, J. Feigenbaum, J. Killian. On Hiding Information from an Oracle J. OF COMPUTER AND SYSTEM SCIENCES, 39, pages 21-50, 1989.
  3. S. J. Chapin and E. H. Spafford. Support for security in distributed systems: Using MESSIATIS. In proceedings of the NATIONAL COMPUTER SECURITY CONFERENCE, pages 339-447, October 1994.
  4. B. Dole, S. Lodin, and E. H. Spafford. Misplaced trust: Kerberos 4 session keys. In Proceedings of 4th SYMPOSIUM ON NETWORK AND DISTRIBUTED SYSTEM SECURITY, pages 60-71, IEEE Press, February 1997.
  5. D. E. Eastlake, S. D. Crocker, and J. 1. Schiller. RFC-1750 Randomness Recommendations for Security. Network Working Group, December 1994.
  6. S. Garfinkel and E. H. Spafford. Practical UNIX f'j Internet Security. O'Reilly & Associates, second edition, 1996.
  7. G. H. Golub and C. F. Van Loan. newblock Matrix Computations. Johns Hopkins University Press, third edition, 1997.
  8. R. A. Horn and C. R. Johnson. Matrix Analysis. Cambridge University Press, 1985.
  9. D. E. Knuth. The Art of Computer Programming, Volume 2. Addison Wesley, second edition, 1981.
  10. R. L. Rivest, L. Adleman, and M. L. Derlollzos. On data banks and privacy homomorphisms. Tn Richard A. DeMillo, edilor, Foundations of Secure Computation, pages 169-177. Academic Press, 1978.
  11. B. Schneier. Applied Cryptography. Wiley, second edition, 1996.
  12. D. R. Stinson. Cryl/tography: Theory and Practice. CRC Press, Boca Raton, FL, 1995.
  13. G. J. Simmons, editor. Contemporary Cryptology: The science of InJonnalion Integrity. IEEE Press, H192.
  14. Author Biographies 9.
  15. Mikhail J. Atallah Mikhail J. Atallah received a BE degree in electrical engineering from the American University, Beirut, Lebanon, in 1975, and MS and Ph.D. degrees in electrical engineering and computer science from Johns Hopkins University, Baltimore, Maryland, in 1980 and 1982, respectively. In 1982, Dr. Atallah joined lhe Purdue University faculty in West Lafayette, Indiana; he is currently a professor in the computer science department. In 1985, he received an NSF Presidential Young Investigator Award from the U.S. National Science Foundation. His research interests include the design and analysis of algorithms, in particular for the application areas of computer security and computational geometry. Dr. Atallah is a fellow of the IEEE, and serves or has served on the editorial boards of SIAM J. on Computing, J. of Parallel and Distributed Computing, Infonnation Processing Letters, Computational Geometry: Theory f'j Applications, Int. J. oj Computational Geometry f'j Applications, Parallel Processing Letters, Methods of Logic in Computer Science. He was Guest Editor for a Special Issue of Algorithmica on Computational Geometry, has served as Editor of the Handbook of Parallel and Distributed Computing (McGraw-FIiIl), as Editorial Advisor for the Handbook of Computer Science and Engineering (CRC Press), and serves as Editor in Chief for the Handbook of Algorithms and Theory of Computation (CRC Press). He has also served on many conference program committees, and state and federal panels.
  16. Konstantinos N. Pantazopoulos
  17. Konstantinos N. Pantazopoulos received a BE degree in Computer Engineering from the University ofPatras, Patras, Greece, in 1991. From 1991 to 1993 he was employed by First Informatics S.A., Athens, Greecc, as a computer scicntist. He joined the Computer Science gradute program at Purdue University in 1993 and earned an MS degree in 1995. He is currently working towards a Ph.D. degree in computational finance under the supervision of Dr. E. N. Houstis. His research interests include numerical algorithms and applications in option pricing systems, parallel and distributed software architectures, and internet security issues. In 1996 he received the Purdue Special Initiative fellowship, and in 1997 the Purdue Research Foundation fellowship. He has been employed as a part-time research assistant at the Softlab group since 1993.
  18. Eugene H. Spafford reccived a B.A. degree in computer science and in mathematics from the State University of New York College at Brockport in 1979, and the MS and Ph.D. degrees in information and computer science from Georgia Institute of Technology in 1981 and 1986, respectively. Tn 1989, Dr. Spafford joined the faculty of Purdue University in West LaCayette, Indiana; he is currently an associate professor in the computer science department (professor as of 8/16/97). In 1992, Professor Spafford founded the COAST Laboratory for research and education in practical computer and network security technologies. He continues as director of that group. Spaf is a senior member of the IEEE, and is a charter recipient of the Computer Society's Golden Core. He holds or has held positions in ACM, IFIP TC 11, the Sun Users' Group, and FIRST. He serves or has served on the editorial boards of International Journal of Computer and Software Engineering, the Virns Bulletin, the Journal of ArtiJicial Life, Network Security, Computers & Security, and the Journal of Information Systems Security, and he was associate editor of the journal Computing Systems. ProCessor Spafford is coauthor of the award-winning book Practical Unix & Internet Security, published by O'Reilly and Associates (1991, 1996), and of Computer Viruses: Dealing with Electronic Vandalism and Programmed Threats, (ADAPSO, 1989). lIe has served as contributing editor to Computer Crime: A Crime-Fighters Handbook, published by O'Reilly and Associates (1995), to Web Security and Commerce, also published by O'Reilly (1997), and as editorial advisor for the Handbook of Computer Science and Engineering (CRG Press, 1997).