Verifiable inner product computation on outsourced database for authenticated multi-user data sharing

被引:6
|
作者
Yang, Haining [1 ]
Su, Ye [1 ]
Qin, Jing [1 ,2 ]
Wang, Huaxiong [3 ]
Song, Yongcheng [4 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Shandong, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Nanyang Technol Univ, Sch Phys & Math Sci, Div Math Sci, Singapore, Singapore
[4] Fujian Normal Univ, Coll Math & Informat, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
基金
中国国家自然科学基金;
关键词
Outsourced computation; Outsourced encrypted data; Inner product; Machine learning; ENCRYPTION; DELEGATION;
D O I
10.1016/j.ins.2020.05.118
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of cloud computing, the practical applications such as the machine learning based on the outsourced data have been investigated in the data sharing setting. In machine learning, the inner product is a necessary primitive to analyze the description statistics. However, the inner product computation in selective data sharing setting has not been fully considered. For this fact, we propose a verifiable inner product computation scheme based on Inner Product Functional Encryption (IPFE). IPFE is employed to preserve the outsourced data privacy and restrict the computation on the outsourced data to be inner product. To achieve the key privacy and result privacy, we transform the secret key into blinded form, which in turn results in a blinded result. With the aim of implementing access control over the data user and outsourced data, we design to let cloud server perform the authentication procedures before computing inner product. This can also eliminate most computational overhead resulting from the unauthorized data user and undesired data. As a result, only the authorized data user can obtain the inner product computed on the designated outsourced data. The proposed scheme is proved to be secure under the authentication model and the result unforgeability model. The performance evaluation shows that the proposed scheme is feasible. To achieve a better security level, the proposed scheme is extended to be secure against the corrupted cloud server. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:295 / 311
页数:17
相关论文
共 50 条
  • [41] Multi-user test of the data quality matrix for product life cycle inventory data
    Weidema B.P.
    The International Journal of Life Cycle Assessment, 1998, 3 (5) : 259 - 265
  • [42] An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data
    Rao, Deepthi
    Kumar, D. V. N. Siva
    Thilagam, P. Santhi
    2018 9TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2018,
  • [43] Verifying outsourced inner product computation via vector aggregation in cloud computing
    Zhang, Qin
    Xiong, Yan
    Lu, Qiwei
    Zhang, Q. (zhangqin@njupt.edu.cn), 1600, Binary Information Press (10): : 2525 - 2532
  • [44] Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing
    Zhao, Xiaolong
    Huang, Zhenjie
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (08): : 10437 - 10453
  • [45] Development and implementation of authenticated multi-user mobile Java']Java applications
    Shell, Jethro
    WTS: 2009 WIRELESS TELECOMMUNICATIONS SYMPOSIUM, 2009, : 254 - 259
  • [46] A secure and efficient outsourced computation on data sharing scheme for privacy computing
    Fan, Kai
    Liu, Tingting
    Zhang, Kuan
    Li, Hui
    Yang, Yintang
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 135 : 169 - 176
  • [47] On the Asynchrony of Computation Offloading in Multi-User MEC Systems
    Guo, Kun
    Quek, Tony Q. S.
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (12) : 7746 - 7761
  • [48] On Distributed Multi-User Secret Sharing with Multiple Secrets per User
    Chigullapally, Rasagna
    Athi, Harshithanjani
    Lalitha, V.
    Karamchandani, Nikhil
    2024 NATIONAL CONFERENCE ON COMMUNICATIONS, NCC, 2024,
  • [49] Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption
    Wang, Xingkai
    Cao, Zhenfu
    Liu, Zhen
    Liang, Kaitai
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 105 - 125
  • [50] The Capacity Region of Distributed Multi-User Secret Sharing
    Khalesi A.
    Mirmohseni M.
    Maddah-Ali M.A.
    Mirmohseni, Mahtab (mirmohseni@sharif.edu), 1600, Institute of Electrical and Electronics Engineers Inc. (02): : 1057 - 1071