CRYPTOLEQ- A HETEROGENEOUS ABSTRACT MACHINE FOR ENCRYPTED AND UNENCRYPTED COMPUTION


CRYPTOLEQ- A HETEROGENEOUS ABSTRACT MACHINE FOR ENCRYPTED AND UNENCRYPTED COMPUTION

The rapid expansion and increased popularity of cloud computing comes with no shortage of privacy concerns about outsourcing computation to semi-trusted parties. Leveraging the power of encryption, in this paper, we introduce Cryptoleq: an abstract machine based on the concept of one instruction set computer, capable of performing general-purpose computation on encrypted programs. The program operands are protected using the Paillier partially homomorphic cryptosystem, which supports addition on the encrypted domain.

Full homomorphism over addition and multiplication, which is necessary for enabling general-purpose computation, is achieved by inventing a heuristically obfuscated software re-encryption module written using Cryptoleq instructions and blended into the executing program. Cryptoleq is heterogeneous, allowing mixing encrypted and unencrypted instruction operands in the same program memory space.
Programming with Cryptoleq is facilitated using an enhanced assembly language that allows the development of any advanced algorithm on encrypted data sets. In our evaluation, we compare Cryptoleq's performance against a popular fully homomorphic encryption library, and demonstrate correctness using a typical private information retrieval problem.





INTRODUCTION
Heterogeneous abstract machine based on one of virtual machine for encrypted data. Leveraging the power of encryption, in this paper, we introduce Cryptoleq’s: an abstract machine based on the concept of one instruction set computer, capable of performing general-purpose computation on encrypted programs.

The program operands are protected using the Paillier partially homomorphism cryptosystem, which supports addition on the encrypted domain. Full homomorphism over addition and multiplication, which is necessary for enabling general-purpose computation, is achieved by inventing a heuristically obfuscated software re-encryption module written using Cryptoleq’s instructions and blended into the executing program.

Cryptoleq’s heterogeneous allowing mixing encrypted and unencrypted instruction operands in the same program memory space. The sources can create abstract machine. Browse text files of data to send abstract machine. The generation of machine to encrypted data using one set instruction implements multiplication.
The memory consider number of sectors and each sectors contain segment of spaces. When this process is executed by availability of memory process. The text file automatically encrypts and sends to sources. Sources select destination to transmit encrypts data. Destination access key with get original files.





Design and implementation of Cryptoleq’s:
Cryptoleq’s supports programs written without privacy protections, as well as protected execution using encrypted data under full encryption or heuristic obfuscation modes, depending on the need to multiply encrypted values.

A practical frame work for Cryptoleq’s:
With extended assembly language, compiler and emulator for executing cryptoleq’s program on different platforms.Cryptoleq’s is a heterogeneous,allowing mixing encrypted and uncrypted instruction operands in the same program memory space. Programming with cryptoleq’s is facilitated using an enhanced assembly language that allows the development.


ARCHITETURE DIAGRAM
1. Design of abstraction machine encryption files
2. Design of memory using segment
3. Sources select Destination process
4. Destination Decryption of Required Process




Design of abstraction machine encryption files
Abstract machines that model software are usually thought of as having very high-level operations. For example, an abstract machine that models a banking system can have operations like "deposit," "withdraw," "transfer," etc. set computer, capable of performing general-purpose. Computation on encrypted programs.



Design of memory using segment
The design of memory based on segment of sector. In the approach, the memory is organized as a collection of sectors. Each sector is a collection of continuous segments (i.e. sequences of memory cells) and all cell addresses within one sector share the same s value, while all cell addresses within one segment have sequential t values. Incrementing a t value by a unit returns the next cell address.




WORK RELATED WITH CRYPTOLEQ
HT design methodology to achieve the above objective, namely DeTrust. Given an HT design, DeTrust keeps its original malicious behaviour while making the HT resistant to state-of-the-art hardware trust verification techniques by manipulating its trigger designs.

To be specific, De Trust implements stealthy implicit triggers for HTs by carefully spreading the trigger logic into multiple sequential levels and combinational logic blocks and combining the trigger logic with the normal logic, so that they are not easily differentiable from normal logic.

The construction of an access-driven sidechannel attack by which a malicious virtual machine (VM) extracts finegrained information from a victim VM running on the same physical computer. This attack is the first such attack demonstrated on a symmetric multiprocessing sys- tem virtualized using a modern VMM (Xen).

Such systems are very common today, ranging from desktops that use virutilization to sandbox application or OS compromises, to clouds that co-locate the workloads of mutually distrust- ful customers. Constructing such a sidechannel requires overcoming challenges including core migration, numerous sources of channel noise, and the difficulty of pre-empting the victim with sufficient frequency to extract fine-grained information.

ALGORITHM DESCRIPTION
Homomorphic encryption schemes are cryptographic constructions which enable to securely perform operations on encrypted data without ever decrypting them. More precisely, a (group) homomorphism encryption scheme over a group (G, ) satisfies that given two encryptions c1 = Ek(m1) and c2 = Ek(m2), where m1, m2 G and k is the encryption key, one can efficiently compute Ek(m1 m2) without decrypting c1 and c2. Homomorphic encryption schemes are widely used in many interesting applications, such as private informationretrival

CONCLUSION
 A new computational model based on the concept of single instruction architecture, able to execute programs whose instruction operands have been encrypted using Paillier PHE scheme. Universal computations achieved by introducing a software function, which adds multiplication to the abstract machine’s native addition and subtraction operations. This function is expressed using the only available instruction. We have also developed an enhanced assembly language to facilitate the development of complex programs, in addition to a compiler and an emulator.

Comments

Popular posts from this blog

Walking Stick with Heart Attack Detection

AUDITING A CLOUD PROVIDER’S COMPLIANCE WITH DATA BACKUP REQUIREMENTS: A GAME THEORETICAL ANALYSIS

A Smart Helmet for Air Quality and Hazardous Event Detection for the Mining Industry