Experimental analysis and comparative study of secure data outsourcing schemes in cloud

被引:0
|
作者
Sudarsan Rao V. [1 ]
Satyanarayana N. [2 ]
机构
[1] Department of CSE, Khammam Institute of Tech. and Sciences, Khammam, TS
[2] Department of CSE, Nagole Institute of Tech. and Sciences, Nagole, Hyderabad, TS
关键词
Cloud computing; Confidential data; Privacy; Private information parameters; Scientific computation; Secure outsourcing;
D O I
10.1504/IJCC.2019.097932
中图分类号
学科分类号
摘要
When customers are transferring their private data to any third party, then there is much responsibility of both security and compliance. The outsourcing process is computationally secure if it is performed without unveiling to the other external agent or cloud, either the original data or the actual solution to the computations. Secure multiparty computation computes a certain function without revealing their private secret information. Homomorphic encryption is another solution that can deal with this situation. In homomorphic encryption, ciphertext (data in encrypted format) should be sent to the cloud, the computations are made on the ciphertext, and the result of this computation is a ciphertext form itself. If the result of the computation is decrypted, then the correct plaintext result must be obtained. In this paper, we summarised our proposed secure outsourcing computing protocols. As a cloud application, our proposed protocols encrypt data by different users and further are transformed to cloud. By utilising our protocols, we performed experimental analysis on virtual cloud to examine the novelty in terms of computational and communication complexity. Our implementations involve both CPU and GPU-based simulation results. We improved our adopted procedure to achieve better speed-up and security. Copyright © 2019 Inderscience Enterprises Ltd.
引用
收藏
页码:83 / 101
页数:18
相关论文
共 50 条
  • [21] Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud
    Yang, Kan
    Jia, Xiaohua
    Ren, Kui
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (12) : 3461 - 3470
  • [22] Practical and Secure Outsourcing of Matrix Computations to the Cloud
    Nassar, Mohamed
    Erradi, Abdelkarim
    Malluhi, Qutaibah M.
    2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013), 2013, : 70 - 75
  • [23] Practical and Secure Outsourcing of Linear Algebra in the Cloud
    Zhang, Juan
    Zhu, Yanqin
    Jin, Fangyuan
    2013 INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2013, : 81 - 87
  • [24] A note on two schemes for secure outsourcing of linear programming
    Cao Z.
    Liu L.
    Liu, Lihua (liulh@shmtu.edu.cn), 1600, Femto Technique Co., Ltd. (19): : 323 - 326
  • [25] Secure Authentication for Data Protection in Cloud Computing using Color Schemes
    Potey, Manish M.
    Dhote, C. A.
    Sharma, Deepak H.
    2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 424 - 427
  • [26] Secure data deduplication using secret sharing schemes over cloud
    Singh, Priyanka
    Agarwal, Nishant
    Raman, Balasubramanian
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 88 : 156 - 167
  • [27] Provably secure public key encryption with keyword search for data outsourcing in cloud environments
    Ghosh, Sudeep
    Islam, S. K. Hafizul
    Bisht, Abhishek
    Das, Ashok Kumar
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 139
  • [28] Secure Data Outsourcing in the Cloud Using Multi-secret Sharing Scheme (MSSS)
    Nag, Amitava
    Choudhary, Soni
    Dawn, Subham
    Basu, Suryadip
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND COMMUNICATION, 2017, 458 : 337 - 343
  • [29] Security analysis and improvement on resilient storage outsourcing schemes in mobile cloud computing
    Liu, Xiao
    Jiang, Rui
    Journal of Southeast University (English Edition), 2012, 28 (04) : 392 - 397
  • [30] Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
    Wang, Cong
    Ren, Kui
    Wang, Jia
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (01) : 216 - 229