JISE


  [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ]


Journal of Information Science and Engineering, Vol. 33 No. 3, pp. 635-652


 Efficient Privacy-Preserving Building Blocks in Cloud Environments under Multiple Keys


HONG RONG, HUI-MEI WANG, JIAN LIU AND MING XIAN
State Key Lab of Complex Electromagnetic Environment Effects on Electronics and Information System
National University of Defense Technology
Changsha, 410073 P.R. China
E-mail: r.hong_nudt@hotmail.com; freshcdwhm@163.com;
ljabc730@gmail.com; qwertmingx@tom.com


    With the rapid growth of big data, clients lack in storage and computational resources tend to outsource their data and computation tasks to cloud service providers. Due to concerns of privacy leakage in cloud, data owners encrypt the data via their own keys before outsourcing. However, it's rather difficult for cloud servers to perform computations over those encrypted data, since most of existing solutions are restricted to single key setting and may reveal the final output to adversary. In this paper, we propose two sets of privacy-preserving building blocks to support outsourced computation. Specifically, these schemes allow the cloud servers to evaluate basic arithmetic functions including addition, multiplication, and exponentiation over ciphertexts under different keys by utilizing the property of proxy re-encryption technique to transform ciphertexts. They are proven to be secure in the semi-honest model and secure against eavesdropping attacks. Experimental results on local testbed and real cloud environment demonstrate that the proposed solutions achieve great performance improvements with low overhead on data owners.


Keywords: big data, cloud computing, privacy-preserving data mining, building blocks, multiple keys

  Retrieve PDF document (JISE_201703_03.pdf)