Skip to main content

Study of a Fuzzy Comprehensive Evaluation Problem in Cloud Computing

  • Conference paper
Book cover Artificial Intelligence and Computational Intelligence (AICI 2012)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7530))

  • 3427 Accesses

Abstract

Under the cloud computing environment, the privacy-preserving fuzzy comprehensive evaluation problem is proposed and solved, which has not been studied in the area of secure multi-party computation. Besides, through the analysis of the protocol’s security, an improved protocol whose security is higher is given based on blind-and-permute protocol and privacy-preserving protocol of finding the maximum component’s position, whose security is stated using the simulation paradigm at last. The experimental results map out the correct possibilities for our algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lindell, Y., Pinkas, B.: Privacy Preserving Data Mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 36–54. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  2. Luo, Y.L., Huang, L.S., et al.: An algorithm for privacy-preserving boolean association rule mining. Acta Electronica Sinica 33(5), 900–903 (2005) (in Chinese with English abstract)

    Google Scholar 

  3. Huang, Y.Q., Lu, Z.D., Hu, H.P.: A method of security improvement for privacy preserving association rule mining over vertically partitioned data. In: Proceedings of the 9th International Database Engineering & Application Symposium, Washington, pp. 339–343 (2005)

    Google Scholar 

  4. Xiao, Q., Luo, S.S., Chen, P., et al.: Research on the problem of secure multi-party ranking under semi-honest model. Acta Electronica Sinica 36(4), 709–714 (2008) (in Chinese with English abstract)

    MATH  Google Scholar 

  5. Chen, J., Liao, J.X., Chen, J.L.: A novel replacement algorithm based on multi-layer fuzzy decision policy with multi-factor. Journal on Communications 21(4), 25–29 (2005) (in Chinese with English abstract)

    Google Scholar 

  6. Mu, C.P., Huang, H.K., Tian, S.F., et al.: Intrusion-detection alerts processing based on fuzzy comprehensive evaluation. Journal of Computer Research and Development 42(10), 679–1685 (2005) (in Chinese with English abstract)

    Article  Google Scholar 

  7. Goldreich, O.: Foundations of Cryptography: Basic Applications. Cambridge University Press, Cambridge (2001)

    Google Scholar 

  8. Atallah, M.J., Du, W.: Secure Multi-party Computational Geometry. In: Dehne, F., Sack, J.-R., Tamassia, R. (eds.) WADS 2001. LNCS, vol. 2125, pp. 165–179. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, W., Jia, B., Cao, B. (2012). Study of a Fuzzy Comprehensive Evaluation Problem in Cloud Computing. In: Lei, J., Wang, F.L., Deng, H., Miao, D. (eds) Artificial Intelligence and Computational Intelligence. AICI 2012. Lecture Notes in Computer Science(), vol 7530. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33478-8_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33478-8_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33477-1

  • Online ISBN: 978-3-642-33478-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics