Linked by Thom Holwerda on Tue 25th May 2010 21:37 UTC
Google Looking at the past few week of Google news, you'll be forgiven for thinking Google doesn't do anything else beyond making Android. While there's sexier stuff going on within Google, the company is also still trying to improve its core user service: search. They've launched encrypted search today, and it will be rolled out across the world in the coming days.
Thread beginning with comment 426582
To read all comments associated with this story, please click here.
Encryption Space Operators
by project_2501 on Wed 26th May 2010 00:14 UTC
Member since:

This seems like an idea:

That is, the target data is encrypted, as are your commands/operators. The only plain text space is within your perimeter.

This means if someone has access to the target data, it is meaningless. Similarly, what you do with it (transform, query, reduce, etc) is also meaningless as the operations/programs are encrypted too, even while they operate on the encrypted data.

This would solve some of the security fears around cloud computing.

Nice idea - could it be implemented? Or is there a theoretical reason this can't be done?

[plain text, my machine]
===== encrypt/decrypt at perimeter ================
@ encrypted command/program/operator
[encrypted data space]

Reply Score: 2

RE: Encryption Space Operators
by AnyoneEB on Thu 27th May 2010 06:48 in reply to "Encryption Space Operators"
AnyoneEB Member since:

It's called homomorphic encryption ( ). Basically, yes, there exist encryption systems such that a remote computer can be given encrypted data and an arbitrary program, convert the program to run on encrypted data, run it, and send back an encrypted result without ever knowing anything about the encrypted data. As that article mentions, such cyptosystems are very recent (the first one was discovered less than a year ago), and their efficiency makes them impracticably slow for many (most?) applications.

Reply Parent Score: 1