Secure Rendering Process in Cloud Computing

被引:0
|
作者
Baharon, Mohd Rizuan [1 ]
Shi, Qi [1 ]
Llewellyn-Jones, David [1 ]
Merabti, Madjid [1 ]
机构
[1] Liverpool John Moores Univ, Sch Comp & Math Sci, Liverpool L3 5UX, Merseyside, England
来源
2013 ELEVENTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST) | 2013年
关键词
Cloud Computing; Data storage; 3D Rendering; Homomorphic Encryption; Elliptic Curve; and n-Multilinear Map;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Big animated film companies these days are migrating their operations to the advent technology of cloud computing. They need quick access to massive amounts of computer power from the cloud to generate a photorealistic animated film within reasonable time and cost as well. However, moving private data to untrusted third parties like clouds raises security concerns. Primitive encryption schemes seem ineffective to be used as the data need to be decrypted first. Thus, homomorphic encryption is believed to be one of the potential solutions as it allows arbitrary computation on encrypted data without decryption. There are a number of fully homomorphic encryption (FHE) schemes that have been proposed and improved upon. Nevertheless, all of them are far from practical as efficiency is still a big obstacle for their implementation. Thus, in this paper a new FHE scheme based on finite fields and support n-multilinear maps is proposed. The key contribution of this paper is to propose a FHE scheme with improved efficiency. To implement such a scheme, a new protocol is proposed. The protocol allows three or more parties to communicate with one another to process data in an encrypted form.
引用
收藏
页码:82 / 87
页数:6
相关论文
共 50 条
  • [21] Secure Video Transcoding in Cloud Computing
    Baharon, Mohd Rizuan
    Shi, Qi
    Llewellyn-Jones, David
    Merabti, Madjid
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 18 - 26
  • [22] Secure cloud computing for genomic data
    Somalee Datta
    Keith Bettinger
    Michael Snyder
    Nature Biotechnology, 2016, 34 : 588 - 591
  • [23] Secure sharing with cryptography in cloud computing
    Chachapara, Kajal
    Bhadlawala, Sunny
    2013 4TH NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE 2013), 2013,
  • [24] Secure integration of IoT and Cloud Computing
    Stergiou, Christos
    Psannis, Kostas E.
    Kim, Byung-Gyu
    Gupta, Brij
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 964 - 975
  • [25] Secure Cloud Computing: Risk Analysis for Secure Cloud Reference Architecture in Legal Metrology
    Oppermann, Alexander
    Esche, Marko
    Thiel, Florian
    Seifert, Jean-Pierre
    PROCEEDINGS OF THE 2018 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2018, : 593 - 602
  • [26] Towards secure mobile cloud computing: A survey
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Khan, Samee U.
    Madani, Sajjad A.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (05): : 1278 - 1299
  • [27] A Security Framework for Secure Cloud Computing Environments
    Jouini, Mouna
    Rabai, Latifa Ben Arfa
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2016, 6 (03) : 32 - 44
  • [28] Secure Identity Management In Mobile Cloud Computing
    Suguna, M.
    Shalinie, S. Mercy
    Anusia, R.
    Deepti, S.
    2017 INTERNATIONAL CONFERENCE ON NEXTGEN ELECTRONIC TECHNOLOGIES: SILICON TO SOFTWARE (ICNETS2), 2017, : 42 - 45
  • [29] Research of Data Secure Based on Cloud Computing
    Shi Yan-rong
    Zhao Xiao-fang
    Chen Shu-yin
    2014 IEEE WORKSHOP ON ELECTRONICS, COMPUTER AND APPLICATIONS, 2014, : 202 - 204
  • [30] An Efficient FHE Scheme to Secure Cloud Computing
    Hariss, Khalil
    Samhat, Abed Ellatif
    Chamoun, Maroun
    PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 341 - 349