Verifiable inner product computation on outsourced database for authenticated multi-user data sharing

被引:6
|
作者
Yang, Haining [1 ]
Su, Ye [1 ]
Qin, Jing [1 ,2 ]
Wang, Huaxiong [3 ]
Song, Yongcheng [4 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Shandong, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Nanyang Technol Univ, Sch Phys & Math Sci, Div Math Sci, Singapore, Singapore
[4] Fujian Normal Univ, Coll Math & Informat, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
基金
中国国家自然科学基金;
关键词
Outsourced computation; Outsourced encrypted data; Inner product; Machine learning; ENCRYPTION; DELEGATION;
D O I
10.1016/j.ins.2020.05.118
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of cloud computing, the practical applications such as the machine learning based on the outsourced data have been investigated in the data sharing setting. In machine learning, the inner product is a necessary primitive to analyze the description statistics. However, the inner product computation in selective data sharing setting has not been fully considered. For this fact, we propose a verifiable inner product computation scheme based on Inner Product Functional Encryption (IPFE). IPFE is employed to preserve the outsourced data privacy and restrict the computation on the outsourced data to be inner product. To achieve the key privacy and result privacy, we transform the secret key into blinded form, which in turn results in a blinded result. With the aim of implementing access control over the data user and outsourced data, we design to let cloud server perform the authentication procedures before computing inner product. This can also eliminate most computational overhead resulting from the unauthorized data user and undesired data. As a result, only the authorized data user can obtain the inner product computed on the designated outsourced data. The proposed scheme is proved to be secure under the authentication model and the result unforgeability model. The performance evaluation shows that the proposed scheme is feasible. To achieve a better security level, the proposed scheme is extended to be secure against the corrupted cloud server. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:295 / 311
页数:17
相关论文
共 50 条
  • [1] Multi-user Verifiable Database with Efficient Keyword Search
    Miao, Meixia
    Wu, Panru
    Wang, Yunling
    CYBERSPACE SAFETY AND SECURITY, CSS 2022, 2022, 13547 : 133 - 146
  • [2] Multi-Client Verifiable Computation Service for Outsourced Data
    Wu, Ying
    Zhang, Rui
    Xue, Rui
    Liu, Ling
    2017 IEEE 24TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2017), 2017, : 556 - 563
  • [3] Verifiable Computation on Outsourced Encrypted Data
    Lai, Junzuo
    Deng, Robert H.
    Pang, Hweehwa
    Weng, Jian
    COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 273 - 291
  • [4] Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database
    Yang, Haining
    Su, Ye
    Qin, Jing
    Wang, Huaxiong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1320 - 1337
  • [5] Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits
    Liu, Xueqiao
    Yang, Guomin
    Susilo, Willy
    He, Kai
    Deng, Robert H.
    Weng, Jian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4929 - 4943
  • [6] Batch Verifiable Computation of Polynomials on Outsourced Data
    Zhang, Liang Feng
    Safavi-Naini, Reihaneh
    COMPUTER SECURITY - ESORICS 2015, PT II, 2015, 9327 : 167 - 185
  • [7] Verifiable outsourced computation over encrypted data
    Yu, Xixun
    Yan, Zheng
    Zhang, Rui
    INFORMATION SCIENCES, 2019, 479 : 372 - 385
  • [8] SEVCOD: secure and efficient verifiable computation on outsourced data
    Chakraborty, Partha Sarathi
    Gavhane, Omkar Santosh
    Tripathy, Somanath
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (04): : 4725 - 4739
  • [9] Towards Multi-User, Secure, and Verifiable $k$NN Query in Cloud Database
    Cui, Ningning
    Qian, Kang
    Cai, Taotao
    Li, Jianxin
    Yang, Xiaochun
    Cui, Jie
    Zhong, Hong
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (09) : 9333 - 9349
  • [10] Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys
    Liu, Xuefeng
    Sun, Wenhai
    Quan, Hanyu
    Lou, Wenjing
    Zhang, Yuqing
    Li, Hui
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2017, 10 (05) : 826 - 838