Verifiable inner product computation on outsourced database for authenticated multi-user data sharing

被引:6
|
作者
Yang, Haining [1 ]
Su, Ye [1 ]
Qin, Jing [1 ,2 ]
Wang, Huaxiong [3 ]
Song, Yongcheng [4 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Shandong, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Nanyang Technol Univ, Sch Phys & Math Sci, Div Math Sci, Singapore, Singapore
[4] Fujian Normal Univ, Coll Math & Informat, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
基金
中国国家自然科学基金;
关键词
Outsourced computation; Outsourced encrypted data; Inner product; Machine learning; ENCRYPTION; DELEGATION;
D O I
10.1016/j.ins.2020.05.118
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of cloud computing, the practical applications such as the machine learning based on the outsourced data have been investigated in the data sharing setting. In machine learning, the inner product is a necessary primitive to analyze the description statistics. However, the inner product computation in selective data sharing setting has not been fully considered. For this fact, we propose a verifiable inner product computation scheme based on Inner Product Functional Encryption (IPFE). IPFE is employed to preserve the outsourced data privacy and restrict the computation on the outsourced data to be inner product. To achieve the key privacy and result privacy, we transform the secret key into blinded form, which in turn results in a blinded result. With the aim of implementing access control over the data user and outsourced data, we design to let cloud server perform the authentication procedures before computing inner product. This can also eliminate most computational overhead resulting from the unauthorized data user and undesired data. As a result, only the authorized data user can obtain the inner product computed on the designated outsourced data. The proposed scheme is proved to be secure under the authentication model and the result unforgeability model. The performance evaluation shows that the proposed scheme is feasible. To achieve a better security level, the proposed scheme is extended to be secure against the corrupted cloud server. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:295 / 311
页数:17
相关论文
共 50 条
  • [31] QShield: Protecting Outsourced Cloud Data Queries With Multi-User Access Control Based on SGX
    Chen, Yaxing
    Zheng, Qinghua
    Yan, Zheng
    Liu, Dan
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021, 32 (02) : 485 - 499
  • [32] Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage
    Liu, Xueqiao
    Yang, Guomin
    Mu, Yi
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1322 - 1332
  • [33] Authenticated multi-user quantum key distribution with single particles
    Lin, Song
    Wang, Hui
    Guo, Gong-De
    Ye, Guo-Hua
    Du, Hong-Zhen
    Liu, Xiao-Fen
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2016, 14 (01)
  • [34] AN EFFICIENT MULTI-USER HIERARCHICAL AUTHENTICATED ENCRYPTION USING SIMULTANEOUS CONGRUENCE FOR HIGHLY SECURE DATA
    Penchalaiah, P.
    Rajasekar, P.
    Viswanth, Srinivas V.
    Reddy, Ramesh K.
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2020, 13 (02): : 1 - 10
  • [35] Multi-User Diversity in a Spectrum Sharing System
    Ban, Tae Won
    Choi, Wan
    Jung, Bang Chu
    Sung, Dan Keun
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (01) : 102 - 106
  • [36] Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification
    Wang, Xu An
    Weng, Jian
    Ma, Jianfeng
    Yang, Xiaoyuan
    INFORMATION SCIENCES, 2019, 488 : 13 - 18
  • [37] PRISM: Private Verifiable Set Computation over Multi-Owner Outsourced Databases
    Li, Yin
    Ghosh, Dhrubajyoti
    Gupta, Peeyush
    Mehrotra, Sharad
    Panwar, Nisha
    Sharma, Shantanu
    SIGMOD '21: PROCEEDINGS OF THE 2021 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2021, : 1116 - 1128
  • [38] MVOC: A Lighter Multi-Client Verifiable Outsourced Computation for Malicious Lightweight Clients
    Wang, Xingkai
    Cao, Zhenfu
    Liu, Zhen
    Liang, Kaitai
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (02) : 1640 - 1654
  • [39] Efficient Public Integrity Checking for Cloud Data Sharing with Multi-User Modification
    Yuan, Jiawei
    Yu, Shucheng
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 2121 - 2129
  • [40] An Oriented-Group Supporting Multi-user Public Auditing for Data Sharing
    Zhang, Jianhong
    Li, Pengyan
    Mao, Jian
    2015 IEEE INTERNATIONAL CONFERENCE ON SMART CITY/SOCIALCOM/SUSTAINCOM (SMARTCITY), 2015, : 996 - 1002