Abstract
Outsourcing data/computation intensive tasks to servers having great computing power and data analytics skills is gaining popularity. While this outsourcing model, due to its cost efficiency, has been widely used by numerous clients, making sure that loss of privacy and integrity of results are not affected remain as challenges, especially in public cloud infrastructure. For addressing these challenges, clients must outsource their data in a privacy-preserving and verifiable manner. The cost of assuring both privacy of data and correctness of results must impose cost marginally less than the cost of actual computation. In this paper, we address the problem of secure outsourcing of Closest Pair of Points computation. Finding Closest Pair of Points is central to many complex applications like clustering. Our scheme involves the client sending encrypted points to the server and receiving the result which is a pair of points (with smallest distance between them) along with a proof of correctness. Data encryption done to ensure privacy of input points must be such that the encrypted points retain the same order as the original points. For this, we designed and used a novel encryption scheme which is additively homomorphic and order-preserving for encrypting input points in our protocol. The protocol requires the server to compute almost all distances to be able to provide the proof of it having computed the results honestly.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Benjamin, D., Atallah, M.: Private and cheating-free outsourcing of algebraic computations. In: 2008 Sixth Annual Conference on Privacy, Security and Trust (2008)
Boldyreva, A., Chenette, N., Lee, Y., O’Neill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 224–241. Springer, Heidelberg (2009)
Tu, S., Kaashoek, M., Madden, S., Zeldovich, N.: Processing analytical queries over encrypted data. Proc. VLDB Endow. 6, 289–300 (2013)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007) (2007)
Purushothama, B., Amberker, B.: Efficient query processing on outsourced encrypted data in cloud with privacy preservation. In: 2012 International Symposium on Cloud and Services Computing (2012)
Vyas, R., Singh, A., Singh, J., Soni, G., Purushothama, B.R.: Design of an efficient verification scheme for correctness of outsourced computations in cloud computing. In: Abawajy, J.H., Mukherjea, S., Thampi, S.M., Ruiz-Martínez, A. (eds.) SSCC 2015. CCIS, vol. 536, pp. 66–77. Springer, Heidelberg (2015). doi:10.1007/978-3-319-22915-7_7
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 223. Springer, Heidelberg (1999)
Atallah, M.J., Pantazopoulos, K.N., Rice, J.R., Spafford, E.E.: Secure outsourcing of scientific computations. Adv. Comput. 54, 215–272 (2002)
Seitkulov, Y.N.: New methods of secure outsourcing of scientific computations. J. Supercomputing 65(1), 469–482 (2013)
Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 264–282. Springer, Heidelberg (2005)
Tysowski, P.K.: Highly Scalable and Secure Mobile Applications in Cloud Computing Systems (Doctoral dissertation, University of Waterloo) (2013)
Hu, X., Tang, C.: Secure outsourced computation of the characteristic polynomial and eigenvalues of matrix. J. Cloud Comput. 4(1), 1–6 (2015)
Mohassel, P.: Efficient and Secure Delegation of Linear Algebra. IACR Cryptology ePrint Archive, 605 (2011)
Wang, C., Ren, K., Wang, J., Urs, K.M.R.: Harnessing the cloud for securely solving large-scale systems of linear equations. In: 31st International Conference on Distributed Computing Systems (ICDCS), pp. 549–558. IEEE (2011)
Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 501–512. ACM (2012)
Jagannathan, G., Wright, R.N.: Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In: Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, pp. 593–599. ACM (2005)
Bunn, P., Ostrovsky, R.: Secure two-party k-means clustering. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 486–497. ACM (2007)
Liu, D., Bertino, E., Yi, X.: Privacy of outsourced k-means clustering. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pp. 123–134. ACM (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kuruba, C., Gilbert, K., Sidhaye, P., Pareek, G., Rangappa, P.B. (2016). Outsource-Secured Calculation of Closest Pair of Points. In: Mueller, P., Thampi, S., Alam Bhuiyan, M., Ko, R., Doss, R., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2016. Communications in Computer and Information Science, vol 625. Springer, Singapore. https://doi.org/10.1007/978-981-10-2738-3_33
Download citation
DOI: https://doi.org/10.1007/978-981-10-2738-3_33
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2737-6
Online ISBN: 978-981-10-2738-3
eBook Packages: Computer ScienceComputer Science (R0)