Skip to main content

Outsource-Secured Calculation of Closest Pair of Points

  • Conference paper
  • First Online:
Book cover Security in Computing and Communications (SSCC 2016)

Abstract

Outsourcing data/computation intensive tasks to servers having great computing power and data analytics skills is gaining popularity. While this outsourcing model, due to its cost efficiency, has been widely used by numerous clients, making sure that loss of privacy and integrity of results are not affected remain as challenges, especially in public cloud infrastructure. For addressing these challenges, clients must outsource their data in a privacy-preserving and verifiable manner. The cost of assuring both privacy of data and correctness of results must impose cost marginally less than the cost of actual computation. In this paper, we address the problem of secure outsourcing of Closest Pair of Points computation. Finding Closest Pair of Points is central to many complex applications like clustering. Our scheme involves the client sending encrypted points to the server and receiving the result which is a pair of points (with smallest distance between them) along with a proof of correctness. Data encryption done to ensure privacy of input points must be such that the encrypted points retain the same order as the original points. For this, we designed and used a novel encryption scheme which is additively homomorphic and order-preserving for encrypting input points in our protocol. The protocol requires the server to compute almost all distances to be able to provide the proof of it having computed the results honestly.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Benjamin, D., Atallah, M.: Private and cheating-free outsourcing of algebraic computations. In: 2008 Sixth Annual Conference on Privacy, Security and Trust (2008)

    Google Scholar 

  2. Boldyreva, A., Chenette, N., Lee, Y., O’Neill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 224–241. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  3. Tu, S., Kaashoek, M., Madden, S., Zeldovich, N.: Processing analytical queries over encrypted data. Proc. VLDB Endow. 6, 289–300 (2013)

    Article  Google Scholar 

  4. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007) (2007)

    Google Scholar 

  5. Purushothama, B., Amberker, B.: Efficient query processing on outsourced encrypted data in cloud with privacy preservation. In: 2012 International Symposium on Cloud and Services Computing (2012)

    Google Scholar 

  6. Vyas, R., Singh, A., Singh, J., Soni, G., Purushothama, B.R.: Design of an efficient verification scheme for correctness of outsourced computations in cloud computing. In: Abawajy, J.H., Mukherjea, S., Thampi, S.M., Ruiz-Martínez, A. (eds.) SSCC 2015. CCIS, vol. 536, pp. 66–77. Springer, Heidelberg (2015). doi:10.1007/978-3-319-22915-7_7

    Chapter  Google Scholar 

  7. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 223. Springer, Heidelberg (1999)

    Google Scholar 

  8. Atallah, M.J., Pantazopoulos, K.N., Rice, J.R., Spafford, E.E.: Secure outsourcing of scientific computations. Adv. Comput. 54, 215–272 (2002)

    Article  Google Scholar 

  9. Seitkulov, Y.N.: New methods of secure outsourcing of scientific computations. J. Supercomputing 65(1), 469–482 (2013)

    Article  Google Scholar 

  10. Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 264–282. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Tysowski, P.K.: Highly Scalable and Secure Mobile Applications in Cloud Computing Systems (Doctoral dissertation, University of Waterloo) (2013)

    Google Scholar 

  12. Hu, X., Tang, C.: Secure outsourced computation of the characteristic polynomial and eigenvalues of matrix. J. Cloud Comput. 4(1), 1–6 (2015)

    Article  Google Scholar 

  13. Mohassel, P.: Efficient and Secure Delegation of Linear Algebra. IACR Cryptology ePrint Archive, 605 (2011)

    Google Scholar 

  14. Wang, C., Ren, K., Wang, J., Urs, K.M.R.: Harnessing the cloud for securely solving large-scale systems of linear equations. In: 31st International Conference on Distributed Computing Systems (ICDCS), pp. 549–558. IEEE (2011)

    Google Scholar 

  15. Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 501–512. ACM (2012)

    Google Scholar 

  16. Jagannathan, G., Wright, R.N.: Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In: Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, pp. 593–599. ACM (2005)

    Google Scholar 

  17. Bunn, P., Ostrovsky, R.: Secure two-party k-means clustering. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 486–497. ACM (2007)

    Google Scholar 

  18. Liu, D., Bertino, E., Yi, X.: Privacy of outsourced k-means clustering. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pp. 123–134. ACM (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gaurav Pareek .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Kuruba, C., Gilbert, K., Sidhaye, P., Pareek, G., Rangappa, P.B. (2016). Outsource-Secured Calculation of Closest Pair of Points. In: Mueller, P., Thampi, S., Alam Bhuiyan, M., Ko, R., Doss, R., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2016. Communications in Computer and Information Science, vol 625. Springer, Singapore. https://doi.org/10.1007/978-981-10-2738-3_33

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2738-3_33

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2737-6

  • Online ISBN: 978-981-10-2738-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics