We argue that cryptography alone can’t enforce the privacy demanded by common cloud computing services, even with such powerful tools as FHE.We formally define a hierarchy of natural classes of private cloud applications, and show that no cryptographic protocol can implement those classes where data is shared among clients. We posit that users of cloud services will also need to rely on other forms of privacy enforcement, such as tamperproof hardware, distributed computing, and complex trust ecosystems.
Category / Keywords: foundations / fully homomorphic encryption, cloud computing Date: received 21 May 2010 Contact author: ajuels at rsa com Available formats: PDF | BibTeX Citation Version: 20100525:211103 (All versions of this report) Discussion forum: Show discussion | Start new discussion