{"id":2559,"date":"2018-03-28T12:24:29","date_gmt":"2018-03-28T12:24:29","guid":{"rendered":"https:\/\/prismacloud.eu\/?p=2559"},"modified":"2018-04-03T12:06:05","modified_gmt":"2018-04-03T12:06:05","slug":"d5-11-verifiable-computing-techniques-and-integrity-preserving-modifications-for-data-managed-by-secure-storage-solutions","status":"publish","type":"post","link":"https:\/\/prismacloud.eu\/d5-11-verifiable-computing-techniques-and-integrity-preserving-modifications-for-data-managed-by-secure-storage-solutions\/","title":{"rendered":"D5.11 Verifiable computing techniques and integrity preserving modifications for data managed by secure storage solutions"},"content":{"rendered":"<p style=\"text-align: justify;\"><strong>Contributing Partners<\/strong><\/p>\n<p style=\"text-align: justify;\">AIT, <strong>TUDA<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>Executive Summary<\/strong><\/p>\n<p style=\"text-align: justify;\">PRISMACLOUD aims at bringing novel cryptographic concepts and methods to practical application, to improve the security and privacy of cloud based services, and make them usable for providers and users.<br \/>\nThe purpose of this deliverable is to extend the architecture and the design of the cryptographic tool VERIDAP. This tool relies on veri\ffiable computing schemes allowing for veri\fafiable data processing by means of performing veri\ffiable computations on data stored in the cloud. In this deliverable we extend the tool described in Deliverable D5.10 such that it supports operations on data stored in distributed fashion, i.e. stored as secret shares. This allows to use VERIDAP together with the PRISMACLOUD tool SECOSTOR.<br \/>\nIn this report \ffirst the VERIDAP tool is introduced by detailing its architecture, component model, terms and de\fnitions, and libraries. Then it shows the functionality of veri\ffiable computing schemes using a possible use case for the VERIDAP tool. Finally, the set of veri\ffiable computing schemes currently supported by our tool is presented and the different properties of the various veri\fable computing schemes are highlighted.<br \/>\nThis report \ffirst shows the functionality of verifi\fable computing schemes operating on secret shares by extending the use case introduced in D5.10. Then, we describe how operations can be performed on data stored in distributed fashion. Afterwards, the veri\ffiable computing scheme which got integrated into VERIDAP to support secret sharing is presented and its properties are highlighted. Finally, we show how the VERIDAP tool and the SECOSTOR tool can be used together.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PRISMACLOUD aims at bringing novel cryptographic concepts and methods to practical application, to improve the security and privacy of cloud based services, and make them usable for providers and users.<br \/>\nThe purpose of this deliverable is to extend the architecture and the design of the cryptographic tool VERIDAP. This tool relies on veri\ffiable computing schemes allowing for veri\fafiable data processing by means of performing veri\ffiable computations on data stored in the cloud. In this deliverable we extend the tool described in Deliverable D5.10 such that it supports operations on data stored in distributed fashion, i.e. stored as secret shares. This allows to use VERIDAP together with the PRISMACLOUD tool SECOSTOR.<br \/>\nIn this report \ffirst the VERIDAP tool is introduced by detailing its architecture, component model, terms and de\fnitions, and libraries. Then it shows the functionality of veri\ffiable computing schemes using a possible use case for the VERIDAP tool. Finally, the set of veri\ffiable computing schemes currently supported by our tool is presented and the different properties of the various veri\fable computing schemes are highlighted.<br \/>\nThis report \ffirst shows the functionality of verifi\fable computing schemes operating on secret shares by extending the use case introduced in D5.10. Then, we describe how operations can be performed on data stored in distributed fashion. Afterwards, the veri\ffiable computing scheme which got integrated into VERIDAP to support secret sharing is presented and its properties are highlighted. Finally, we show how the VERIDAP tool and the SECOSTOR tool can be used together.<\/p>\n","protected":false},"author":2,"featured_media":2560,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17,7],"tags":[],"_links":{"self":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts\/2559"}],"collection":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/comments?post=2559"}],"version-history":[{"count":4,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts\/2559\/revisions"}],"predecessor-version":[{"id":2575,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/posts\/2559\/revisions\/2575"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/media\/2560"}],"wp:attachment":[{"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/media?parent=2559"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/categories?post=2559"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/prismacloud.eu\/wp-json\/wp\/v2\/tags?post=2559"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}