Experimental analysis and comparative study of secure data outsourcing schemes in cloud

被引:0
|
作者
Sudarsan Rao V. [1 ]
Satyanarayana N. [2 ]
机构
[1] Department of CSE, Khammam Institute of Tech. and Sciences, Khammam, TS
[2] Department of CSE, Nagole Institute of Tech. and Sciences, Nagole, Hyderabad, TS
关键词
Cloud computing; Confidential data; Privacy; Private information parameters; Scientific computation; Secure outsourcing;
D O I
10.1504/IJCC.2019.097932
中图分类号
学科分类号
摘要
When customers are transferring their private data to any third party, then there is much responsibility of both security and compliance. The outsourcing process is computationally secure if it is performed without unveiling to the other external agent or cloud, either the original data or the actual solution to the computations. Secure multiparty computation computes a certain function without revealing their private secret information. Homomorphic encryption is another solution that can deal with this situation. In homomorphic encryption, ciphertext (data in encrypted format) should be sent to the cloud, the computations are made on the ciphertext, and the result of this computation is a ciphertext form itself. If the result of the computation is decrypted, then the correct plaintext result must be obtained. In this paper, we summarised our proposed secure outsourcing computing protocols. As a cloud application, our proposed protocols encrypt data by different users and further are transformed to cloud. By utilising our protocols, we performed experimental analysis on virtual cloud to examine the novelty in terms of computational and communication complexity. Our implementations involve both CPU and GPU-based simulation results. We improved our adopted procedure to achieve better speed-up and security. Copyright © 2019 Inderscience Enterprises Ltd.
引用
收藏
页码:83 / 101
页数:18
相关论文
共 50 条
  • [31] Secure outsourcing of modular exponentiations in cloud and cluster computing
    Ye, Jun
    Xu, Zheng
    Ding, Yong
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (02): : 811 - 820
  • [32] Secure Outsourcing of Geospatial Vector Data
    Chaudhari, Sangita
    Venkatachalam, Parvatham
    Buddhiraju, Krishna Mohan
    2019 IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM (IGARSS 2019), 2019, : 871 - 874
  • [33] Secure and Practical Outsourcing of Linear Programming in Cloud Computing
    Wang, Cong
    Ren, Kui
    Wang, Jia
    2011 PROCEEDINGS IEEE INFOCOM, 2011, : 820 - 828
  • [34] Secure outsourcing of modular exponentiations in cloud and cluster computing
    Jun Ye
    Zheng Xu
    Yong Ding
    Cluster Computing, 2016, 19 : 811 - 820
  • [35] A Secure and Practical Mechanism for Outsourcing ELMs in Cloud Computing
    Lin, Jiarun
    Yin, Jianping
    Cai, Zhiping
    Liu, Qiang
    Li, Kuan
    Leung, Victor C. M.
    IEEE INTELLIGENT SYSTEMS, 2013, 28 (06) : 35 - 38
  • [36] Dividing secrets to secure data outsourcing
    Emekci, Fatih
    Methwally, Ahmed
    Agrawal, Divyakant
    El Abbadi, Amr
    INFORMATION SCIENCES, 2014, 263 : 198 - 210
  • [37] A Domain Specific Language for Secure Outsourcing of Computatation to the Cloud
    Nassar, Mohamed
    Erradi, Abdelkarim
    Malluhi, Qutaibah M.
    PROCEEDINGS OF THE 2015 IEEE 19TH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, 2015, : 134 - 141
  • [38] A Model Driven Framework for Secure Outsourcing of Computation to the Cloud
    Nassar, Mohamed
    Erradi, Abdelkarim
    Sabry, Farida
    Malluhi, Qutaihah M.
    2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 968 - 969
  • [39] An experimental and comparative study examining resource utilization in cloud data center
    Braiki, Khaoula
    Youssef, Habib
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (08): : 11085 - 11102
  • [40] Comparative Requirements Analysis for the Feasibility of Blockchain for Secure Cloud
    Singh, Irish
    Lee, Seok-Won
    REQUIREMENTS ENGINEERING FOR INTERNET OF THINGS, 2018, 809 : 57 - 72