Author : Swetha K B 1
Date of Publication :15th June 2017
Abstract: In this paper, we propose a toolkit for efficient and privacy-preserving outsourced calculation under multiple encrypted keys (EPOM). Using EPOM, a large amount of users can safely outsource their information to a cloud server for storage. Moreover, encrypted data which belongs to different users can be processed without compromising on the security of the individual user's (original) data and the final computed results. To avoid the associated key management cost and private key exposure risk in EPOM, we use a distributed two-trapdoor public-key cryptosystem, the core cryptographic primitive. We also present the toolkit to make sure that the commonly used integer operations can be securely handled across different encrypted domains. We then prove that the proposed EPOM achieves the goal of secure integer number processing without resulting in privacy leakage of data to unauthorized parties. Last, we demonstrate the utility and the efficiency of EPOM using simulations.
Reference :
-
- R. Lu, H. Zhu, X. Liu, J. K. Liu, and J. Shao, toward efficient and privacy-preserving computing in big data era IEEE Network., vol. 28, no. 4, pp. 46Ð50, Jul/Aug. 2014.
- Q. Do, B. Martini, and K.-K. R. Choo, ÒA forensically sound adversary model for mobile devices PLoS ONE, vol. 10, no. 9, p. e0138449, 2015.
- X. Liu, B. Qin, R. Deng, and Y. Li, An efficient privacy-preserving outsourced computation over public data IEEE Trans. Service Computer, to be published.
- Cloud Computing, accessed on 2016. [Offline]. Available: https:// en. wikipedia. org/ wiki/ Cloud_c omputing
- University of Melbourne. The Cloud Computing and Distributed Systems (CLOUDS) Laboratory, accessed on 2015. [Online]. Available: http://www.cloudbus.org/
- D. Catalano and D. Fiore, Boosting linearlyhomomorphic encryption to evaluate degree-2 functions on encrypted data IACR Cryptol. EPrint Archive, Oct. 2014. [Online]. Available: http://eprint.iacr.org/2014/813
- Z. Brakerski and V. Vaikuntanathan, Efficient fully homomorphic encryption from (standard) LWE,Ó SIAM J. Computer., vol. 43, no. 2, pp. 831Ð871, 2014.
- [ P. Mukherjee and D. Wichs, Two round multiparty computation via multi-key FHE,Ó IACR Cryptol. EPrint Archive, Apr. 2015. [Online]. Available: http://eprint.iacr.org/2015/345