TY - GEN
T1 - HEROIC
T2 - 17th Design, Automation and Test in Europe, DATE 2014
AU - Tsoutsos, Nektarios Georgios
AU - Maniatakos, Michail
PY - 2014
Y1 - 2014
N2 - As cloud computing becomes mainstream, the need to ensure the privacy of the data entrusted to third parties keeps rising. Cloud providers resort to numerous security controls and encryption to thwart potential attackers. Still, since the actual computation inside cloud microprocessors remains unencrypted, the opportunity of leakage is theoretically possible. Therefore, in order to address the challenge of protecting the computation inside the microprocessor, we introduce a novel general purpose architecture for secure data processing, called HEROIC (Homomorphically EncRypted One Instruction Computer). This new design utilizes a single instruction architecture and provides native processing of encrypted data at the architecture level. The security of the solution is assured by a variant of Paillier's ho-momorphic encryption scheme, used to encrypt both instructions and data. Experimental results using our hardware-cognizant software simulator, indicate an average execution overhead between 5 and 45 times for the encrypted computation (depending on the security parameter), compared to the unencrypted variant, for a 16-bit single instruction architecture.
AB - As cloud computing becomes mainstream, the need to ensure the privacy of the data entrusted to third parties keeps rising. Cloud providers resort to numerous security controls and encryption to thwart potential attackers. Still, since the actual computation inside cloud microprocessors remains unencrypted, the opportunity of leakage is theoretically possible. Therefore, in order to address the challenge of protecting the computation inside the microprocessor, we introduce a novel general purpose architecture for secure data processing, called HEROIC (Homomorphically EncRypted One Instruction Computer). This new design utilizes a single instruction architecture and provides native processing of encrypted data at the architecture level. The security of the solution is assured by a variant of Paillier's ho-momorphic encryption scheme, used to encrypt both instructions and data. Experimental results using our hardware-cognizant software simulator, indicate an average execution overhead between 5 and 45 times for the encrypted computation (depending on the security parameter), compared to the unencrypted variant, for a 16-bit single instruction architecture.
KW - Encrypted processor
KW - Paillier
KW - cloud computing
KW - homomorphic encryption
KW - one instruction set computer
UR - http://www.scopus.com/inward/record.url?scp=84903830664&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84903830664&partnerID=8YFLogxK
U2 - 10.7873/DATE2014.259
DO - 10.7873/DATE2014.259
M3 - Conference contribution
AN - SCOPUS:84903830664
SN - 9783981537024
SN - 9783981537024
T3 - Proceedings -Design, Automation and Test in Europe, DATE
BT - Proceedings - Design, Automation and Test in Europe, DATE 2014
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 24 March 2014 through 28 March 2014
ER -