Keynote Presentation - Securing Data in Clouds: Making the Most of Trusted Hardware

pdf

ABSTRACT

Data encryption and data processing within cloud computing form a dichotomy. If access to data is granted to a cloud provider, the tremendous processing power of clouds can be leveraged. On the other hand, if data owners manage their own encryption, the data is more secure but processing capabilities are limited.‚Äč

In this talk, we will explore how trusted hardware can be leveraged to provide meaningful protections to data within clouds. Our focus is on how trusted hardware can be incorporated into the cloud infrastructure to protect both keys and data in use. We hope that these ideas will provide a path forward for cloud providers and data owners who want to both secure their data and process it within the cloud.

This work was done in conjunction with Anita Woodley, Benjamin Carr, and Randy Meisel.

BIO

Nick Felts is a computer systems researcher at the National Security Agency. He has a multi-disciplinary background spanning cyber physical systems, cloud development, and cryptography in systems. His recent efforts have focused on researching approaches to secure data-in-use within distributed systems. He holds a B.S. and M.S. in computer science from the University of South Alabama.

 

 

 

  • Presentations
Submitted by Anonymous on