Abstract
Under the cloud computing environment, the privacy-preserving fuzzy comprehensive evaluation problem is proposed and solved, which has not been studied in the area of secure multi-party computation. Besides, through the analysis of the protocol’s security, an improved protocol whose security is higher is given based on blind-and-permute protocol and privacy-preserving protocol of finding the maximum component’s position, whose security is stated using the simulation paradigm at last. The experimental results map out the correct possibilities for our algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lindell, Y., Pinkas, B.: Privacy Preserving Data Mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 36–54. Springer, Heidelberg (2000)
Luo, Y.L., Huang, L.S., et al.: An algorithm for privacy-preserving boolean association rule mining. Acta Electronica Sinica 33(5), 900–903 (2005) (in Chinese with English abstract)
Huang, Y.Q., Lu, Z.D., Hu, H.P.: A method of security improvement for privacy preserving association rule mining over vertically partitioned data. In: Proceedings of the 9th International Database Engineering & Application Symposium, Washington, pp. 339–343 (2005)
Xiao, Q., Luo, S.S., Chen, P., et al.: Research on the problem of secure multi-party ranking under semi-honest model. Acta Electronica Sinica 36(4), 709–714 (2008) (in Chinese with English abstract)
Chen, J., Liao, J.X., Chen, J.L.: A novel replacement algorithm based on multi-layer fuzzy decision policy with multi-factor. Journal on Communications 21(4), 25–29 (2005) (in Chinese with English abstract)
Mu, C.P., Huang, H.K., Tian, S.F., et al.: Intrusion-detection alerts processing based on fuzzy comprehensive evaluation. Journal of Computer Research and Development 42(10), 679–1685 (2005) (in Chinese with English abstract)
Goldreich, O.: Foundations of Cryptography: Basic Applications. Cambridge University Press, Cambridge (2001)
Atallah, M.J., Du, W.: Secure Multi-party Computational Geometry. In: Dehne, F., Sack, J.-R., Tamassia, R. (eds.) WADS 2001. LNCS, vol. 2125, pp. 165–179. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, W., Jia, B., Cao, B. (2012). Study of a Fuzzy Comprehensive Evaluation Problem in Cloud Computing. In: Lei, J., Wang, F.L., Deng, H., Miao, D. (eds) Artificial Intelligence and Computational Intelligence. AICI 2012. Lecture Notes in Computer Science(), vol 7530. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33478-8_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-33478-8_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33477-1
Online ISBN: 978-3-642-33478-8
eBook Packages: Computer ScienceComputer Science (R0)