D5.11 Verifiable computing techniques and integrity preserving modifications for data managed by secure storage solutions
Contributing Partners
AIT, TUDA
Executive Summary
PRISMACLOUD aims at bringing novel cryptographic concepts and methods to practical application, to improve the security and privacy of cloud based services, and make them usable for providers and users.
The purpose of this deliverable is to extend the architecture and the design of the cryptographic tool VERIDAP. This tool relies on verifiable computing schemes allowing for veriafiable data processing by means of performing verifiable computations on data stored in the cloud. In this deliverable we extend the tool described in Deliverable D5.10 such that it supports operations on data stored in distributed fashion, i.e. stored as secret shares. This allows to use VERIDAP together with the PRISMACLOUD tool SECOSTOR.
In this report first the VERIDAP tool is introduced by detailing its architecture, component model, terms and denitions, and libraries. Then it shows the functionality of verifiable computing schemes using a possible use case for the VERIDAP tool. Finally, the set of verifiable computing schemes currently supported by our tool is presented and the different properties of the various veriable computing schemes are highlighted.
This report first shows the functionality of verifiable computing schemes operating on secret shares by extending the use case introduced in D5.10. Then, we describe how operations can be performed on data stored in distributed fashion. Afterwards, the verifiable computing scheme which got integrated into VERIDAP to support secret sharing is presented and its properties are highlighted. Finally, we show how the VERIDAP tool and the SECOSTOR tool can be used together.