Data Obfuscation for Privacy and Confidentiality in Cloud Computing

被引:1
|
作者
Khan, Khaled M. [1 ]
Shaheen, Mahboob [1 ]
机构
[1] Qatar Univ, Dept Comp Sci & Engn, KINDI Comp Lab, Doha, Qatar
关键词
Secure services; data obfuscation; matrix multiplication; privacy; confidentiality;
D O I
10.1109/QRS-C.2015.41
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper proposes a data obfuscation approach in outsourcing matrix multiplication to cloud computing. It is primarily based on splitting the rows and columns of matrices to alter their actual dimension coupled with adding random noise and shuffling in order to ensure confidentiality and privacy. In our approach, obfuscated matrices are sent to servers without any public key encryption. While it computes on matrices, the server is unable to extract or derive actual values either from obfuscated matrices or from computed multiplication results. Whereas, clients can extract actual computed values using a very insignificant computing effort from results produced by the server.
引用
收藏
页码:195 / 196
页数:2
相关论文
共 50 条
  • [41] Privacy-aware Data Storage in Cloud Computing
    Pottier, Remy
    Menaud, Jean-Marc
    [J]. CLOSER: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2017, : 377 - 384
  • [42] Privacy of Clients' Locations in Big Data and Cloud Computing
    Hassoon, Imad Ali
    Tapus, Nicolae
    Jasim, Anwar Chitheer
    [J]. 2018 IEEE 12TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2018, : 543 - 548
  • [43] Data security and privacy information challenges in cloud computing
    Kong, Weiwei
    Lei, Yang
    Ma, Jing
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2018, 16 (03) : 215 - 218
  • [44] Survey of Privacy Data Protection Technology in Cloud Computing
    Wang, Yang
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR EDUCATION (ICTE 2016), 2016, : 143 - 145
  • [45] Interaction of Secure Cloud Network and Crowd Computing for Smart City Data Obfuscation
    Thirumalaisamy, Manikandan
    Basheer, Shajahan
    Selvarajan, Shitharth
    Althubiti, Sara A.
    Alenezi, Fayadh
    Srivastava, Gautam
    Lin, Jerry Chun-Wei
    [J]. SENSORS, 2022, 22 (19)
  • [46] Ensuring data confidentiality and integrity in edge computing environments : A security and privacy perspective
    Kale, Rohini Suhas
    Hase, Jayashri
    Deshmukh, Shyam
    Ajani, Samir N.
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 421 - 430
  • [47] LOCATION OBFUSCATION FOR LOCATION DATA PRIVACY
    Kachore, Vaibhav Ankush
    Lakshmi, J.
    Nandy, S. K.
    [J]. 2015 IEEE WORLD CONGRESS ON SERVICES, 2015, : 213 - 220
  • [48] Fast Cloud-Paillier homomorphic schemes for protecting confidentiality of sensitive data in cloud computing
    El Makkaoui, Khalid
    Ezzati, Abdellah
    Beni-Hssane, Abderrahim
    Ouhmad, Slimane
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (06) : 2205 - 2214
  • [49] PCR and Bio-signature for data confidentiality and integrity in mobile cloud computing
    Sukumaran, Sreeja Cherillath
    Misbahuddin, Mohammed
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (04) : 426 - 435
  • [50] Cloud-ElGamal and Fast Cloud-RSA Homomorphic Schemes for Protecting Data Confidentiality in Cloud Computing
    El Makkaoui, Khalid
    Beni-Hssane, Abderrahim
    Ezzati, Abdellah
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2019, 11 (03) : 90 - 102