Cryptology ePrint Archive: Report 2010/305

On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing

Marten van Dijk and Ari Juels

Abstract: Cloud computing denotes an architectural shift toward thin clients and conveniently centralized provision of computing resources. Clients’ lack of direct resource control in the cloud prompts concern about the potential for data privacy violations, particularly abuse or leakage of sensitive information by service providers. Cryptography is an oft-touted remedy. Among its most powerful primitives is fully homomorphic encryption (FHE), dubbed by some the field’s “Holy Grail,” and recently realized as a fully functional construct with seeming promise for cloud privacy.

We argue that cryptography alone can’t enforce the privacy demanded by common cloud computing services, even with such powerful tools as FHE.We formally define a hierarchy of natural classes of private cloud applications, and show that no cryptographic protocol can implement those classes where data is shared among clients. We posit that users of cloud services will also need to rely on other forms of privacy enforcement, such as tamperproof hardware, distributed computing, and complex trust ecosystems.

Category / Keywords: foundations / fully homomorphic encryption, cloud computing

Date: received 21 May 2010

Contact author: ajuels at rsa com

Available format(s): PDF | BibTeX Citation

Version: 20100525:211103 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]