Skip to main content
Log in

Secure outsourcing of modular exponentiations in cloud and cluster computing

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Cloud computing and cluster computing are user-centric computing services. The shared software and hardware resources and information can be provided to the computers and other equipments according to the demands of users. A majority of services are deployed through outsourcing. Outsourcing computation allows resource-constrained clients to outsource their complex computation workloads to a powerful server which is rich of computation resources. Modular exponentiation is one of the most complex computations in public key based cryptographic schemes. It is useful to reduce the computation cost of the clients by using outsourcing computation. In this paper, we propose a novel outsourcing algorithm for modular exponentiation based on the new mathematical division under the setting of two non-colluding cloud servers. The base and the power of the outsourced data can be kept private and the efficiency is improved compared with former works.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Abadi, M., Feigenbaum, J., Kilian, J.: On hiding information from an oracle. J. Comput. Syst. Sci. 39(1), 21–50 (1989)

    Article  MATH  MathSciNet  Google Scholar 

  2. Atallah, M.J., Frikken, K.B.: Securely outsourcing linear algebra computations. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 48–59. Springer-Verlag, , New York (2010)

  3. Atallah, M.J., Pantazopoulos, K.N., Rice, J.R., Spafford, E.H.: Secure outsourcing of scientific computations. Adv. Comput. 54, 215–272 (2002)

    Article  Google Scholar 

  4. Beaver, D., Feigenbaum, J.: Hiding instances in multioracle queries. In: Proceedings of 7th Annual Symposium on Theoretical Aspects of Computer Science (STACS 90), Rouen, France, 22–24 Feb, vol. 415, pp. 37–48. Springer-Verlag, New York (1990)

  5. Beaver, D., Feigenbaum, J., Kilian, J., Rogaway, P.: Locally random reductions: Improvements and applications. J. Cryptol. 10(1), 17–36 (1997)

    Article  MATH  MathSciNet  Google Scholar 

  6. Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable delegation of computation over large datasets. In: Advances in Cryptology–CRYPTO 2011, pp. 111–131. Springer, New York (2011)

  7. Benjamin, D., Atallah, M.J.: Private and cheating-free outsourcing of algebraic computations. In: Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, PST, Washington, DC, pp. 483–501. Springer-Verlag, New York (2008)

  8. Blum, M., Luby, M., Rubinfeld, R.: Program result checking against adaptive programs and in cryptographic settings. DIMACS Ser. Discrete Math. Theor. Comput. Sci. 2, 107–118 (1991)

    MATH  MathSciNet  Google Scholar 

  9. Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Advances in Cryptology - CRYPTO ’92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, 16–20 Aug, 1992, pp. 89–105 (1992)

  10. Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. In: Proceedinfs of 17th European Symposium on Research in Computer Security, Pisa, Italy, vol. 7459, pp. 541–556. Springer-Verlag, New York (2012)

  11. Choi, S.G., Katz, J., Kumaresan, R., Cid, C.: Multi-client Non-interactive Verifiable Computation, vol. 7785, pp. 499–518. Springer-Verlag, London (2013)

    MATH  Google Scholar 

  12. Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In Proceedings of the 2012 ACM conference on Computer and communications security, pp. 501–512. ACM, New York (2012)

  13. Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Advances in Cryptology— CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, 15–19 Aug, 2010, pp. 465–482 (2010)

  14. M. Girault and D. Lefranc. Server-aided verification: Theory and practice. In Proc. of 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, volume 3788, pages 605–623. Springer-Verlag, December 2005

  15. Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: TCC, 2005, LNCS, vol. 3378, pp. 264–282. Springer-Verlag, New York (2005)

  16. Hu, C., Xu, Z., Liuand, Y., Mei, L., Chen, L., Luo, X.: Semantic link network-based model for organizing multimedia big data. IEEE Trans. Emerg. Top. Comput. 2(3), 376–387 (2014)

    Article  Google Scholar 

  17. Jakobsson, M., Wetzel, S.: Secure server-aided signature generation. In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, 13–15, Feb, 2001, pp. 383–401 (2001)

  18. Li, J., Chen, X., Huang, Q., Wong, D.S.: Digital provenance: enabling secure data forensics in cloud computing. Future Gener. Comput. Syst. 37, 259–266 (2014)

    Article  Google Scholar 

  19. Li, J., Li, J., Chen, X., Liu, Z., Jia, C.: Privacy-preserving data utilization in hybrid clouds. Future Gener. Comput. Syst. 30, 98–106 (2014)

    Article  Google Scholar 

  20. Nguyen, P.Q., Shparlinski, I.E., Stern, J.: Distribution of modular sums and the security of the server aided exponentiation. Cryptogr. Comput. Number Theory 20, 331–342 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  21. Parno, B., Howell, J., Gentry, C., Raykova, M.: Pinocchio: Nearly Practical Verifiable Computation, pp. 238–252. Springer-Verlag, Berlin (2013)

  22. Rooij, P.: On schnorr’s preprocessing for digital signature schemes. J. Cryptol. 10(1), 1–16 (1997)

    Article  MATH  Google Scholar 

  23. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)

    Article  Google Scholar 

  24. van Dijk, M., Clarke, D.E., Gassend, B., Suh, G.E., Devadas, S.: Speeding up exponentiation using an untrusted computational resource. Des. Codes Cryptogr. 39(2), 253–273 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  25. Wang, Y., Wu, Q., Wong, D.S., Qin, B., Chow, S.S. M., Liu, Z., Tan, X.: Securely outsourcing exponentiations with single untrusted program for cloud storage. In: Computer Security—ESORICS 2014—19th European Symposium on Research in Computer Security, Wroclaw, Poland, 7–11, Sept, 2014, pp. 326–343 (2014)

  26. Wang, J.F., Ma, H., Tang, Q., Li, J., Zhu, H., Ma, S.Q., Chen, X.F.: Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10(2), 667–684 (2013)

    Article  Google Scholar 

  27. Wu, W., Mu, Y., Susilo, W., Huang, X.: Server-aided verification signatures: Definitions and new constructions. In: Proceedings of Second International Conference, ProvSec 2008, Shanghai, China, vol. 5324, pp. 141–155. Springer-Verlag, New York (2008)

  28. Xu, Z., Liu, Y., Yen, N., Mei, L., Luo, X., Wei, X., Hu, C.: Crowdsourcing based description of urban emergency events using social media big data. IEEE Trans. Cloud Comput. (2016). doi:10.1109/TCC.2016.2517638

  29. Ye, J., Zhang, H., Fu, C.: Verifiable delegation of polynomials. Int. J. Netw. Secur. 18(2), 283–290 (2016)

    Google Scholar 

  30. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)

    Article  Google Scholar 

Download references

Acknowledgments

The work described in this paper is supported by the Opening Project of Sichuan Province University Key Laboratory of Bridge Non-destruction Detecting and Engineering Computing (No. 2015QYJ04); The Fund of Lab of Security Insurance of Cyberspace, Sichuan Province; The Scientific Research Fund Project of Sichuan University of Science & Engineering (No.2013KY02); Guangxi natural science foundation (2013GXNSFBB053005); Guangxi Science Research & Technology Development Project 14124004-4-10; Guangdong natural science foundation (2014A030313517); Guangxi experiment center of information science Foundation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zheng Xu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ye, J., Xu, Z. & Ding, Y. Secure outsourcing of modular exponentiations in cloud and cluster computing. Cluster Comput 19, 811–820 (2016). https://doi.org/10.1007/s10586-016-0571-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-016-0571-z

Keywords

Navigation