Skip to main content
Log in

Labrador: towards fair and auditable data sharing in cloud computing with long-term privacy

  • Research Paper
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

Data are one of the most important sources of power that drives the world today. However, aggregating data is not an easy task with increasing legal regulations and concerns from users about their data privacy, and therefore incentives might be needed to encourage data sharing. In this paper, we present Labrador (LB), a system to handle the above problems. Our result demonstrates long-term privacy that reveals only an analytic result to the data analyst. An analytic task is delegated to clouds, which holds users’ homomorphically encrypted data. We develop a lightweight verifiable blind decryption technique over the linearly homomorphic encryption scheme to verify the final result. Thus, its verifiability and blindness rely on over-determined and under-determined systems, respectively. To support incentives in data sharing, we leverage smart contract to realize binding contracts between mutually distrusted parties. In the game theory model with a non-collusion assumption, Labrador is secure against any rational adversary. Our evaluation demonstrates that the computational overhead for the data analyst and the data owner is insignificant (i.e., only a few seconds and milliseconds, respectively).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Xu S M, Yang G M, Mu Y, et al. Secure fine-grained access control and data sharing for dynamic groups in the cloud. IEEE Trans Inform Forensic Secur, 2018, 13: 2101–2113

    Article  Google Scholar 

  2. Shen J, Zhou T Q, Chen X F, et al. Anonymous and traceable group data sharing in cloud computing. IEEE Trans Inform Forensic Secur, 2018, 13: 912–925

    Article  Google Scholar 

  3. Li J, Zhang Y H, Chen X F, et al. Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur, 2018, 72: 1–12

    Article  Google Scholar 

  4. Li R X, Shen C L, He H, et al. A lightweight secure data sharing scheme for mobile cloud computing. IEEE Trans Cloud Comput, 2018, 6: 344–357

    Article  Google Scholar 

  5. Shao J, Lu R X, Lin X D. Fine-grained data sharing in cloud computing for mobile devices. In: Proceedings of International Conference on Computer Communications, Kowloon, 2015. 2677–2685

  6. Yuan J W, Yu S C. Efficient public integrity checking for cloud data sharing with multi-user modification. In: Proceedings of International Conference on Computer Communications, Toronto, 2014. 2121–2129

  7. Brakerski Z, Gentry C, Vaikuntanathan V. (Leveled) fully homomorphic encryption without bootstrapping. ACM Trans Comput Theor, 2014, 6: 1–36

    Article  MathSciNet  MATH  Google Scholar 

  8. Smart N P, Vercauteren F. Fully homomorphic encryption with relatively small key and ciphertext sizes. In: Proceedings of Public Key Cryptography, Paris, 2010. 420–443

  9. Brakerski Z, Vaikuntanathan V. Efficient fully homomorphic encryption from (Standard) LWE. In: Proceedings of IEEE 52nd Annual Symposium on Foundations of Computer Science, Palm Springs, 2011. 97–106

  10. van Dijk M, Gentry C, Halevi S, et al. Fully homomorphic encryption over the integers. In: Advances in Cryptology—EUROCRYPT 2010. Berlin: Springer, 2010. 24–43

    Chapter  Google Scholar 

  11. Gentry C, Halevi S, Smart N P. Fully homomorphic encryption with polylog overhead. In: Advances in Cryptology—EUROCRYPT 2012. Berlin: Springer, 2012. 465–482

    Chapter  Google Scholar 

  12. Gentry C, Sahai A, Waters B. Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. In: Advances in Cryptology—CRYPTO 2013. Berlin: Springer, 2013. 75–92

    Chapter  Google Scholar 

  13. Fan J F, Vercauteren F. Somewhat practical fully homomorphic encryption. IACR Cryptol ePrint Archive, 2012. https://eprint.iacr.org/2012/144

  14. Liu Y, Luo Y, Zhu Y W, et al. Secure multi-label data classification in cloud by additionally homomorphic encryption. Inf Sci, 2018, 468: 89–102

    Article  MathSciNet  MATH  Google Scholar 

  15. Chen H, Laine K, Rindal P. Fast private set intersection from homomorphic encryption. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security, Dallas, 2017. 1243–1255

  16. Lu W J, Kawasaki S, Sakuma J. Using fully homomorphic encryption for statistical analysis of categorical, ordinal and numerical data. In: Proceedings of the 24th Annual Network and Distributed System Security Symposium, San Diego, 2017

  17. Zhang L, Li X-Y, Liu Y H, et al. Verifiable private multi-party computation: ranging and ranking. In: Proceedings of International Conference on Computer Communications, Turin, 2013. 605–609

  18. Fiore D, Gennaro R, Pastro V. Efficiently verifiable computation on encrypted data. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, 2014. 844–855

  19. Elkhiyaoui K, Önen M, Azraoui M, et al. Efficient techniques for publicly verifiable delegation of computation. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, Xi’an, 2016. 119–128

  20. Song W, Wang B, Wang Q, et al. Publicly verifiable computation of polynomials over outsourced data with multiple sources. IEEE Trans Inform Forensic Secur, 2017, 12: 2334–2347

    Article  Google Scholar 

  21. Gennaro R, Gentry C, Parno B. Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Advances in Cryptology—CRYPTO 2010. Berlin: Springer, 2010. 465–482

  22. Backes M, Fiore D, Reischuk R M. Verifiable delegation of computation on outsourced data. In: Proceedings of ACM SIGSAC Conference on Computer & Communications Security, Berlin, 2013. 863–874

  23. Parno B, Howell J, Gentry C, et al. Pinocchio: nearly practical verifiable computation. In: Proceedings of IEEE Symposium on Security and Privacy, Berkeley, 2013. 238–252

  24. Zhuo G Q, Jia Q, Guo L K, et al. Privacy-preserving verifiable data aggregation and analysis for cloud-assisted mobile crowdsourcing. In: Proceedings of International Conference on Computer Communications, San Francisco, 2016. 1–9

  25. Zheng Q J, Xu S H, Ateniese G. VABKS: verifiable attribute-based keyword search over outsourced encrypted data. In: Proceedings of International Conference on Computer Communications, Toronto, 2014. 522–530

  26. Canetti R, Riva B, Rothblum G N. Practical delegation of computation using multiple servers. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, Chicago, 2011. 445–454

  27. van den Hooff J, Kaashoek M F, Zeldovich N. VerSum: verifiable computations over large public logs. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, 2014. 1304–1316

  28. Castro M, Liskov B. Practical Byzantine fault tolerance and proactive recovery. ACM Trans Comput Syst, 2002, 20: 398–461

    Article  Google Scholar 

  29. Cachin C, Kursawe K, Shoup V. Random oracles in Constantinople: practical asynchronous Byzantine agreement using cryptography. J Cryptol, 2005, 18: 219–246

    Article  MathSciNet  MATH  Google Scholar 

  30. Dong C Y, Wang Y L, Aldweesh A, et al. Betrayal, distrust, and rationality: smart counter-collusion contracts for verifiable cloud computing. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security, Dallas, 2017. 211–227

  31. Xia Q, Sifah E B, Asamoah K O, et al. MeDShare: trust-less medical data sharing among cloud service providers via blockchain. IEEE Access, 2017, 5: 14757–14767

    Article  Google Scholar 

  32. Xia Q, Sifah E B, Smahi A, et al. BBDS: blockchain-based data sharing for electronic medical records in cloud environments. Information, 2017, 8: 44

    Article  Google Scholar 

  33. Maschler M, Solan E, Zamir S. Game Theory. Cambridge: Cambridge University Press, 2013

    Book  MATH  Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant No. 61672300), National Natural Science Foundation of Tianjin (Grant No. 18ZXZNGX00140), National Natural Science Foundation for Outstanding Youth Foundation (Grant No. 61722203), Program for Young Changjiang Scholars in University of Ministry of Education of China, and Natural Science Foundation of China for Joint Fund Project (Grant No. U1936218).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Jin Li or Zheli Liu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Guo, X., Li, J., Liu, Z. et al. Labrador: towards fair and auditable data sharing in cloud computing with long-term privacy. Sci. China Inf. Sci. 65, 152106 (2022). https://doi.org/10.1007/s11432-020-2940-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-020-2940-8

Keywords

Navigation