0
Your cart

Your cart is empty

Books > Computing & IT > General theory of computing

Buy Now

Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers (Hardcover) Loot Price: R2,002
Discovery Miles 20 020
You Save: R653 (25%)
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers (Hardcover): Bryan Jeffrey Parno

Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers (Hardcover)

Bryan Jeffrey Parno

Series: ACM Books

 (sign in to rate)
Was R2,655 Loot Price R2,002 Discovery Miles 20 020 | Repayment Terms: R188 pm x 12* You Save R653 (25%)

Bookmark and Share

Expected to ship within 12 - 19 working days

As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldomadopted. In this book, I argue that we can resolve the tension between security and features by leveraging the trust a user has in one device to enable her to securely use another commodity device or service, without sacrificing the performance and features expected of commodity systems. At a high level, we support this premise by developing techniques to allow a user to employ a small, trusted, portable device to securely learn what code is executing on her local computer. Rather than entrusting her data to the mountain of buggy code likely running on her computer, we construct an on-demand secure execution environment which can perform security-sensitive tasks and handle private data in complete isolation from all other software (and most hardware) on the system. Meanwhile, non-security-sensitive software retains the same abundance of features and performance it enjoys today. Having established an environment for secure code execution on an individual computer, we then show how to extend trust in this environment to network elements in a secure and efficient manner. This allows us to reexamine the design of network protocols and defenses, since we can now execute code on endhosts and trust the results within the network. Lastly, we extend the user's trust one more step to encompass computations performed on a remote host (e.g., in the cloud). We design, analyze, and prove secure a protocol that allows a user to outsource arbitrary computations to commodity computers run by an untrusted remote party (or parties) who may subject the computers to both software and hardware attacks. Our protocol guarantees that the user can both verify that the results returned are indeed the correct results of the specified computations on the inputs provided, and protect the secrecy of both the inputs and outputs of the computations. These guarantees are provided in a non-interactive, asymptotically optimal (with respect to CPU and bandwidth) manner. Thus, extending a user's trust, via software, hardware, and cryptographic techniques, allows us to provide strong security protections for both local and remote computations on sensitive data, while still preserving the performance and features of commodity computers.

General

Imprint: Morgan and Claypool Life Sciences
Country of origin: United States
Series: ACM Books
Release date: June 2014
Authors: Bryan Jeffrey Parno
Dimensions: 235 x 191 x 13mm (L x W x T)
Format: Hardcover - Cloth over boards
Pages: 207
ISBN-13: 978-1-62705-545-1
Categories: Books > Computing & IT > General theory of computing > General
Books > Computing & IT > Applications of computing > General
Promotions
LSN: 1-62705-545-2
Barcode: 9781627055451

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

Systems Analysis And Design In A…
John Satzinger, Robert Jackson, … Hardcover  (1)
R1,366 R1,270 Discovery Miles 12 700
Oracle 12c - SQL
Joan Casteel Paperback  (1)
R1,406 R1,302 Discovery Miles 13 020
Systems Analysis And Design
Scott Tilley Hardcover R1,385 R1,285 Discovery Miles 12 850
Foundations Of Computer Science
Behrouz Forouzan Paperback R1,269 R1,185 Discovery Miles 11 850
Introduction to Computer Theory
Daniel I. A. Cohen Paperback  (4)
R6,943 Discovery Miles 69 430
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, … Paperback R1,355 R1,259 Discovery Miles 12 590
Dynamic Web Application Development…
David Parsons, Simon Stobart Paperback R1,341 R1,245 Discovery Miles 12 450
Program Construction - Calculating…
Roland Backhouse Paperback R1,467 Discovery Miles 14 670
Discovering Computers, Essentials…
Susan Sebok, Jennifer Campbell, … Paperback R1,289 R1,197 Discovery Miles 11 970
Introduction to the Theory of…
Michael Sipser Hardcover R1,354 R1,253 Discovery Miles 12 530
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,932 Discovery Miles 19 320
Principles of Biomedical Informatics
Ira J. Kalet Ph.D. Hardcover R1,852 Discovery Miles 18 520

See more

Partners