Abstract
Cloud computing and cluster computing are user-centric computing services. The shared software and hardware resources and information can be provided to the computers and other equipments according to the demands of users. A majority of services are deployed through outsourcing. Outsourcing computation allows resource-constrained clients to outsource their complex computation workloads to a powerful server which is rich of computation resources. Modular exponentiation is one of the most complex computations in public key based cryptographic schemes. It is useful to reduce the computation cost of the clients by using outsourcing computation. In this paper, we propose a novel outsourcing algorithm for modular exponentiation based on the new mathematical division under the setting of two non-colluding cloud servers. The base and the power of the outsourced data can be kept private and the efficiency is improved compared with former works.
Similar content being viewed by others
References
Abadi, M., Feigenbaum, J., Kilian, J.: On hiding information from an oracle. J. Comput. Syst. Sci. 39(1), 21–50 (1989)
Atallah, M.J., Frikken, K.B.: Securely outsourcing linear algebra computations. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 48–59. Springer-Verlag, , New York (2010)
Atallah, M.J., Pantazopoulos, K.N., Rice, J.R., Spafford, E.H.: Secure outsourcing of scientific computations. Adv. Comput. 54, 215–272 (2002)
Beaver, D., Feigenbaum, J.: Hiding instances in multioracle queries. In: Proceedings of 7th Annual Symposium on Theoretical Aspects of Computer Science (STACS 90), Rouen, France, 22–24 Feb, vol. 415, pp. 37–48. Springer-Verlag, New York (1990)
Beaver, D., Feigenbaum, J., Kilian, J., Rogaway, P.: Locally random reductions: Improvements and applications. J. Cryptol. 10(1), 17–36 (1997)
Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable delegation of computation over large datasets. In: Advances in Cryptology–CRYPTO 2011, pp. 111–131. Springer, New York (2011)
Benjamin, D., Atallah, M.J.: Private and cheating-free outsourcing of algebraic computations. In: Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, PST, Washington, DC, pp. 483–501. Springer-Verlag, New York (2008)
Blum, M., Luby, M., Rubinfeld, R.: Program result checking against adaptive programs and in cryptographic settings. DIMACS Ser. Discrete Math. Theor. Comput. Sci. 2, 107–118 (1991)
Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Advances in Cryptology - CRYPTO ’92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, 16–20 Aug, 1992, pp. 89–105 (1992)
Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. In: Proceedinfs of 17th European Symposium on Research in Computer Security, Pisa, Italy, vol. 7459, pp. 541–556. Springer-Verlag, New York (2012)
Choi, S.G., Katz, J., Kumaresan, R., Cid, C.: Multi-client Non-interactive Verifiable Computation, vol. 7785, pp. 499–518. Springer-Verlag, London (2013)
Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In Proceedings of the 2012 ACM conference on Computer and communications security, pp. 501–512. ACM, New York (2012)
Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Advances in Cryptology— CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, 15–19 Aug, 2010, pp. 465–482 (2010)
M. Girault and D. Lefranc. Server-aided verification: Theory and practice. In Proc. of 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, volume 3788, pages 605–623. Springer-Verlag, December 2005
Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: TCC, 2005, LNCS, vol. 3378, pp. 264–282. Springer-Verlag, New York (2005)
Hu, C., Xu, Z., Liuand, Y., Mei, L., Chen, L., Luo, X.: Semantic link network-based model for organizing multimedia big data. IEEE Trans. Emerg. Top. Comput. 2(3), 376–387 (2014)
Jakobsson, M., Wetzel, S.: Secure server-aided signature generation. In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, 13–15, Feb, 2001, pp. 383–401 (2001)
Li, J., Chen, X., Huang, Q., Wong, D.S.: Digital provenance: enabling secure data forensics in cloud computing. Future Gener. Comput. Syst. 37, 259–266 (2014)
Li, J., Li, J., Chen, X., Liu, Z., Jia, C.: Privacy-preserving data utilization in hybrid clouds. Future Gener. Comput. Syst. 30, 98–106 (2014)
Nguyen, P.Q., Shparlinski, I.E., Stern, J.: Distribution of modular sums and the security of the server aided exponentiation. Cryptogr. Comput. Number Theory 20, 331–342 (2001)
Parno, B., Howell, J., Gentry, C., Raykova, M.: Pinocchio: Nearly Practical Verifiable Computation, pp. 238–252. Springer-Verlag, Berlin (2013)
Rooij, P.: On schnorr’s preprocessing for digital signature schemes. J. Cryptol. 10(1), 1–16 (1997)
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)
van Dijk, M., Clarke, D.E., Gassend, B., Suh, G.E., Devadas, S.: Speeding up exponentiation using an untrusted computational resource. Des. Codes Cryptogr. 39(2), 253–273 (2006)
Wang, Y., Wu, Q., Wong, D.S., Qin, B., Chow, S.S. M., Liu, Z., Tan, X.: Securely outsourcing exponentiations with single untrusted program for cloud storage. In: Computer Security—ESORICS 2014—19th European Symposium on Research in Computer Security, Wroclaw, Poland, 7–11, Sept, 2014, pp. 326–343 (2014)
Wang, J.F., Ma, H., Tang, Q., Li, J., Zhu, H., Ma, S.Q., Chen, X.F.: Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10(2), 667–684 (2013)
Wu, W., Mu, Y., Susilo, W., Huang, X.: Server-aided verification signatures: Definitions and new constructions. In: Proceedings of Second International Conference, ProvSec 2008, Shanghai, China, vol. 5324, pp. 141–155. Springer-Verlag, New York (2008)
Xu, Z., Liu, Y., Yen, N., Mei, L., Luo, X., Wei, X., Hu, C.: Crowdsourcing based description of urban emergency events using social media big data. IEEE Trans. Cloud Comput. (2016). doi:10.1109/TCC.2016.2517638
Ye, J., Zhang, H., Fu, C.: Verifiable delegation of polynomials. Int. J. Netw. Secur. 18(2), 283–290 (2016)
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)
Acknowledgments
The work described in this paper is supported by the Opening Project of Sichuan Province University Key Laboratory of Bridge Non-destruction Detecting and Engineering Computing (No. 2015QYJ04); The Fund of Lab of Security Insurance of Cyberspace, Sichuan Province; The Scientific Research Fund Project of Sichuan University of Science & Engineering (No.2013KY02); Guangxi natural science foundation (2013GXNSFBB053005); Guangxi Science Research & Technology Development Project 14124004-4-10; Guangdong natural science foundation (2014A030313517); Guangxi experiment center of information science Foundation.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ye, J., Xu, Z. & Ding, Y. Secure outsourcing of modular exponentiations in cloud and cluster computing. Cluster Comput 19, 811–820 (2016). https://doi.org/10.1007/s10586-016-0571-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-016-0571-z