Previous Page  21 / 36 Next Page
Information
Show Menu
Previous Page 21 / 36 Next Page
Page Background

An adversary observing the computations of a GC learns nothing about what it is

doing, what data it is operating on (whether inputs or intermediate values), and the

outputs it is producing. The GC enables execution on untrusted platforms, of trusted

and confidential code whose inputs and outputs are sensitive. For example it can enable

the utilization of Amazon cloud services without revealing to Amazon the nature of the

computation or the data, and without requiring Amazon to change the operation of its

cloud services (i.e., use standard off-the-shelf services).

Successful development of the GC would be a disruptive technology that would

create substantial commercialization opportunities and significant scientific

implications on the area of cyber security.

The project received initial support from the Qatar National Research Fund

under the exceptional NPRP program. Several Qatar University researchers have been

leading this research effort including Qutaibah Malluhi, Aiman Erbad, Khaled Khan,

Ryan Riley and Abdullatif Shikfa. Researchers at Purdue University have been also

collaborating on this project.

Research of the issue

21