Proofs of Ownership on Encrypted Cloud Data via Intel SGX

VenueCategory
ACNS'20PoW

Proofs of Ownership on Encrypted Cloud Data via Intel SGX1. SummaryMotivation of this paperPoWISImplementation and Evaluation2. Strength (Contributions of the paper)3. Weakness (Limitations of the paper)4. Some Insights (Future work)

1. Summary

Motivation of this paper

PoWIS

Implementation and Evaluation

2. Strength (Contributions of the paper)

  1. PoWIS is the first secure PoW protocol designed for encrypted cloud data.

3. Weakness (Limitations of the paper)

4. Some Insights (Future work)

  1. an immediate remediation is to ask potential data owner to first encrypt the original file, and then compute the PoW proof over the encrypted file.

this can only ensure that prover really owns the encrypted file, instead of the original file.

  1. Original PoW: Merkle tree is first constructed over a file, and resulting Merkle root will be stored by the cloud server.

the cloud server will issue a challenge to the client.

  1. Remote Attestation Via the RA, the client can ensure that the enclave is running on the remote cloud server and executions inside the enclave are trustworthy.

a secure channel can be established between the client and the enclave at the same time. (allow the client to communicate with the enclave directly)

  1. Performance consideration By randomly checking a certain number of file blocks (e.g., 460), the cloud server can detect this misbehavior with a high probability (e.g., 99%)