ABSTRACT
Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing capabilities, smart devices need to rely on cloud servers for heavy-duty computations such as matrix multiplication. Conventional security mechanisms such as public key encryption is not an option to safeguard data from cloud servers to see them. Ensuring client data confidentiality in cloud computing can be achieved using data obfuscating techniques instead of encryption. In a matrix multiplication application, clients can protect their data from dishonest or curious cloud servers which perform multiplication operations on matrices without `knowing or seeing' actual values of input matrices. In our approach, we introduce random noise to the data, and generate several matrices randomly from each matrix in order to cloak data from cloud servers. The main idea is to mask the data as well as confuse the cloud server so it is unable to derive or guess the actual values of matrices as well as computer results.
- M. Atallah and K. Frikken. 2010. Securely Outsourcing Linear Algebra Computations. In ASIACCS. 48--59. Google ScholarDigital Library
- M. Atallah, K. Frikken, and S. Wang. 2012. Private Outsourcing of Matrix Multiplication over Closed Semi-rings. In SECRYPT. 136--144.Google Scholar
- M. Blanton, M. Atallah, K. Frikken, and Q. Malluhi. 2012. Secure and Efficient Outsourcing of Sequence Comparisons. In ESORICS. 505--522.Google Scholar
- J. Bos, K. Lauter, and M. Naehrig. 2014. Private predictive analysis on encrypted medical data. Journal of Biomedical Informatics (2014), 50:234--243.Google Scholar
- B.Parno, J. McCune, and A. Perrig. 2011. Bootstrapping Trusting Modern Computers. Springer. Google ScholarDigital Library
- T. Chou and C. Orlandi. 2015. The Simplest Protocol for Oblivious Transfer. In LATINCRYPT, Report 2015/267. Cryptology ePrint Archive, 84--89. Google ScholarDigital Library
- Benjamin D. and M. Atallah. 2008. Private and Cheating-Free Outsourcing of Algebraic Computations. In IEEE Annual Conf. on Privacy, Security and Trust. 240--245. Google ScholarDigital Library
- D. Fiore and R. Gennaro. 2012. Publicly verifiable delegation of large polynomials and matrix computations, with applications. In CCS. 501--512. Google ScholarDigital Library
- C. Gentry. 2009. A fully homomorphic encryption scheme. Stanford University.Google Scholar
- K. Khan and S. Mahboob. 2014. Empowering Users of Cloud Computing on Data Confidentiality. In IEEE CloudNet. 286--288.Google Scholar
- P. Mohassel. 2011. Efficient and secure delegation of linear algebra. In IACR, Cryptology.Google Scholar
- M. Nassar, A. Erradi, F. Sabri, and Q. Malluhi. 2013. Secure Outsourcing of Matrix Operations as a Service. In IEEE International Conference on Cloud Computing. 918--925. Google ScholarDigital Library
- C. Wang and K. Ren. 2011. Secure and Practical Outsourcing of Linear Programming in Cloud Computing. In IEEE INFOCOM. 820--828.Google Scholar
- A. Yao. 1986. How to Generate and Exchange Secrets. In 27th Sym. on Foundations of Computer Science. Google ScholarDigital Library
Recommendations
A New Approach to Preserving Data Confidentiality in the Cloud
IDEAS '16: Proceedings of the 20th International Database Engineering & Applications SymposiumCloud computing is a recent trend of technology that aims to provide unlimited, on-demand, elastic computing and data storage resources. In this context, cloud services decrease the need for local data storage and the infrastructure costs. However, ...
Protection of users' data confidentiality in cloud computing
Internetware '10: Proceedings of the Second Asia-Pacific Symposium on InternetwareCurrent cloud computing systems pose serious limitation to protecting users' data confidentiality. Since users' sensitive data is presented in unencrypted forms to remote machines owned and operated by third party service providers, the risks of ...
An Approach to Data Confidentiality Protection in Cloud Environments
In current cloud computing systems, because users' data is stored and processed by computing systems managed and operated by various service providers, users are concerned with the risks of unauthorized usage of their sensitive data by various entities, ...
Comments