Secure Rendering Process in Cloud Computing

被引:0
|
作者
Baharon, Mohd Rizuan [1 ]
Shi, Qi [1 ]
Llewellyn-Jones, David [1 ]
Merabti, Madjid [1 ]
机构
[1] Liverpool John Moores Univ, Sch Comp & Math Sci, Liverpool L3 5UX, Merseyside, England
关键词
Cloud Computing; Data storage; 3D Rendering; Homomorphic Encryption; Elliptic Curve; and n-Multilinear Map;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Big animated film companies these days are migrating their operations to the advent technology of cloud computing. They need quick access to massive amounts of computer power from the cloud to generate a photorealistic animated film within reasonable time and cost as well. However, moving private data to untrusted third parties like clouds raises security concerns. Primitive encryption schemes seem ineffective to be used as the data need to be decrypted first. Thus, homomorphic encryption is believed to be one of the potential solutions as it allows arbitrary computation on encrypted data without decryption. There are a number of fully homomorphic encryption (FHE) schemes that have been proposed and improved upon. Nevertheless, all of them are far from practical as efficiency is still a big obstacle for their implementation. Thus, in this paper a new FHE scheme based on finite fields and support n-multilinear maps is proposed. The key contribution of this paper is to propose a FHE scheme with improved efficiency. To implement such a scheme, a new protocol is proposed. The protocol allows three or more parties to communicate with one another to process data in an encrypted form.
引用
收藏
页码:82 / 87
页数:6
相关论文
共 50 条
  • [1] Secure Data Process in Distributed Cloud Computing
    Sharmila, P.
    Danapaquiame, N.
    Subhapriya, R.
    Janakiram, A.
    Amudhavel, J.
    BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2018, 11 (01): : 75 - 84
  • [2] Secure virtualization for cloud computing
    Lombardi, Flavio
    Di Pietro, Roberto
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) : 1113 - 1122
  • [3] Secure mobile cloud computing
    Kolodziej, Joanna
    Jaatun, Martin Gilje
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (18):
  • [4] Secure Desktop Computing in the Cloud
    Krisler, Brian
    Pal, Partha
    Bertilson, Zech
    Thomsen, Dan
    2019 6TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2019) / 2019 5TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2019), 2019, : 107 - 112
  • [5] Secure torage of Data in Cloud Computing
    Fu, Zhangjie
    Cao, Xinyue
    Wang, Jin
    Sun, Xingming
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 783 - 786
  • [6] Secure storage of data in cloud computing
    20150500466883
    (1) School of Computer and Software and Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing; 210044, China, 1600, IEEE Tainan Section; International Society of Management Engineers; JSPS/NSFC/NRF A3 Foresight Program Ultra-Realistic Acoustic Interactive Communication on Next-Generation Internet; Tainan Chapter of IEEE Signal Processing Society; Waseda University (Institute of Electrical and Electronics Engineers Inc.):
  • [7] A hybrid algorithm for secure cloud computing
    Das D.
    International Journal of Wireless and Mobile Computing, 2020, 18 (02) : 116 - 122
  • [8] A Secure Cloud Computing Scaling Model
    Lei, Mingyue
    Huang, Zheng
    Wen, Qiaoyan
    Hu, Chunye
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 60 - 66
  • [9] Cryptographic Protocols for Secure Cloud Computing
    Alhumrani, S. A.
    Kar, Jayaprakash
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (02): : 301 - 310
  • [10] Secure Document Service for Cloud Computing
    Xu, Jin-Song
    Huang, Ru-Cheng
    Huang, Wan-Ming
    Yang, Geng
    CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 541 - +