{"id":"https://openalex.org/W4393956409","doi":"https://doi.org/10.1145/3603166.3632554","title":"Is Securing an Untrusted Cloud with Cryptography Still Economically Unviable?","display_name":"Is Securing an Untrusted Cloud with Cryptography Still Economically Unviable?","publication_year":2023,"publication_date":"2023-12-04","ids":{"openalex":"https://openalex.org/W4393956409","doi":"https://doi.org/10.1145/3603166.3632554"},"language":"en","primary_location":{"id":"doi:10.1145/3603166.3632554","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3603166.3632554","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3603166.3632554","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the IEEE/ACM 16th International Conference on Utility and Cloud Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3603166.3632554","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5095559290","display_name":"Kevin Klassen","orcid":"https://orcid.org/0009-0004-1078-2314"},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kevin Klassen","raw_affiliation_strings":["Engineering for Professionals, Johns Hopkins University, Baltimore, MD, USA"],"raw_orcid":"https://orcid.org/0009-0004-1078-2314","affiliations":[{"raw_affiliation_string":"Engineering for Professionals, Johns Hopkins University, Baltimore, MD, USA","institution_ids":["https://openalex.org/I145311948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058955985","display_name":"Jake Skinner","orcid":null},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jake Skinner","raw_affiliation_strings":["Engineering for Professionals, Johns Hopkins University, Baltimore, MD, USA"],"raw_orcid":"https://orcid.org/0009-0000-3870-5901","affiliations":[{"raw_affiliation_string":"Engineering for Professionals, Johns Hopkins University, Baltimore, MD, USA","institution_ids":["https://openalex.org/I145311948"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046121001","display_name":"Joel Coffman","orcid":"https://orcid.org/0000-0002-5500-4450"},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]},{"id":"https://openalex.org/I430641","display_name":"United States Air Force Academy","ror":"https://ror.org/0055d0g64","country_code":"US","type":"government","lineage":["https://openalex.org/I1330347796","https://openalex.org/I4210089612","https://openalex.org/I4210102105","https://openalex.org/I430641"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Joel Coffman","raw_affiliation_strings":["Department of Computer and Cyber Sciences, United States Air Force Academy, USAF Academy, CO, USA","Engineering for Professionals, Johns Hopkins University, Baltimore, MD, United States","Engineering for Professionals, Johns Hopkins University, Baltimore, MD, United States Department of Computer and Cyber Sciences, United States Air Force Academy, USAF Academy, CO, USA"],"raw_orcid":"https://orcid.org/0000-0002-5500-4450","affiliations":[{"raw_affiliation_string":"Department of Computer and Cyber Sciences, United States Air Force Academy, USAF Academy, CO, USA","institution_ids":["https://openalex.org/I430641"]},{"raw_affiliation_string":"Engineering for Professionals, Johns Hopkins University, Baltimore, MD, United States","institution_ids":["https://openalex.org/I145311948"]},{"raw_affiliation_string":"Engineering for Professionals, Johns Hopkins University, Baltimore, MD, United States Department of Computer and Cyber Sciences, United States Air Force Academy, USAF Academy, CO, USA","institution_ids":["https://openalex.org/I430641","https://openalex.org/I145311948"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5095559290"],"corresponding_institution_ids":["https://openalex.org/I145311948"],"apc_list":null,"apc_paid":null,"fwci":0.1704,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.61111783,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7728464603424072},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7007906436920166},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6360341310501099},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6249272227287292},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13697198033332825}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7728464603424072},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7007906436920166},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6360341310501099},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6249272227287292},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13697198033332825}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3603166.3632554","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3603166.3632554","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3603166.3632554","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the IEEE/ACM 16th International Conference on Utility and Cloud Computing","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3603166.3632554","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3603166.3632554","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3603166.3632554","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the IEEE/ACM 16th International Conference on Utility and Cloud Computing","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6700000166893005}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306078","display_name":"U.S. Department of Defense","ror":"https://ror.org/0447fe631"},{"id":"https://openalex.org/F4320310145","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95"},{"id":"https://openalex.org/F4320337633","display_name":"U.S. Air Force Academy","ror":"https://ror.org/0055d0g64"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4393956409.pdf","grobid_xml":"https://content.openalex.org/works/W4393956409.grobid-xml"},"referenced_works_count":15,"referenced_works":["https://openalex.org/W1662801026","https://openalex.org/W1966747660","https://openalex.org/W1971286892","https://openalex.org/W1971394347","https://openalex.org/W1984680759","https://openalex.org/W2081765108","https://openalex.org/W2118955868","https://openalex.org/W2169466806","https://openalex.org/W2181165335","https://openalex.org/W2912328458","https://openalex.org/W3026923845","https://openalex.org/W3095102583","https://openalex.org/W4212907179","https://openalex.org/W4378710505","https://openalex.org/W4385235411"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W4244478748","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W2560439919","https://openalex.org/W4389340727","https://openalex.org/W3150465815","https://openalex.org/W2060145807","https://openalex.org/W4248806346"],"abstract_inverted_index":{"This":[0],"paper":[1],"explores":[2],"the":[3,37,40,57,68,96,110,125,135],"economic":[4,97],"implications":[5,127],"of":[6,39,60,70,99,128,137],"outsourcing":[7],"data":[8,21,30],"and":[9,36,63,147,182],"computation":[10,151],"to":[11,17,115,152],"a":[12,28,33,72,92,153],"cloud":[13,101,117,139,155,161,172,184],"provider":[14,156],"in":[15,78,178],"comparison":[16],"maintaining":[18],"an":[19,45,143,170],"on-premise":[20],"center.":[22],"Our":[23,89],"investigation":[24],"is":[25,157],"twofold:":[26],"contrasting":[27],"private":[29],"center":[31],"with":[32,43,81,142],"trusted":[34,131,154],"cloud,":[35,74],"evaluation":[38],"costs":[41,162],"associated":[42],"securing":[44,71,129,168],"untrusted":[46,171],"(e.g.,":[47],"honest-but-curious)":[48],"cloud.":[49],"We":[50],"revisit":[51],"prior":[52],"cost":[53,59,69,126],"models":[54],"based":[55],"on":[56,95,124],"current":[58],"CPU":[61],"cycles":[62],"cryptographic":[64],"operations.":[65],"To":[66],"evaluate":[67],"public":[73,116],"we":[75],"compare":[76],"execution":[77],"AWS":[79,82],"EC2":[80],"Clean":[83],"Rooms,":[84],"which":[85],"facilitates":[86],"encrypted":[87],"querying.":[88],"study":[90],"offers":[91],"nuanced":[93],"perspective":[94],"feasibility":[98],"different":[100],"computing":[102,140],"paradigms,":[103],"providing":[104],"essential":[105],"insights":[106],"for":[107],"organizations":[108],"contemplating":[109],"transition":[111],"from":[112],"local":[113],"infrastructure":[114],"providers.":[118],"Additionally,":[119],"our":[120],"analysis":[121],"sheds":[122],"light":[123],"against":[130,169],"insider":[132],"threats,":[133],"emphasizing":[134],"importance":[136],"aligning":[138],"decisions":[141],"organization's":[144],"risk":[145],"tolerance":[146],"security":[148],"posture.":[149],"Outsourcing":[150],"economical":[158],"today":[159],"as":[160],"have":[163],"declined":[164],"since":[165],"2010,":[166],"but":[167],"remains":[173],"economically":[174],"unviable":[175],"despite":[176],"advances":[177],"secure":[179],"query":[180],"processing":[181],"new":[183],"services.":[185]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
