Secure outsourcing of sequence comparisons

被引:13
|
作者
Atallah M.J. [1 ]
Li J. [1 ]
机构
[1] CERIAS, Department of Computer Sciences, Purdue University, West Lafayette, IN 47907
关键词
Edit distance; Privacy; Secure multiparty computation; Secure outsourcing; Sequence comparison;
D O I
10.1007/s10207-005-0070-3
中图分类号
学科分类号
摘要
Internet computing technologies, like grid computing, enable a weak computational device connected to such a grid to be less limited by its inadequate local computational, storage, and bandwidth resources. However, such a weak computational device (PDA, smartcard, sensor, etc.) often cannot avail itself of the abundant resources available on the network because its data are sensitive. This motivates the design of techniques for computational outsourcing in a privacy-preserving manner, i.e., without revealing to the remote agents whose computational power is being used either one's data or the outcome of the computation. This paper investigates such secure outsourcing for widely applicable sequence comparison problems and gives an efficient protocol for a customer to securely outsource sequence comparisons to two remote agents. The local computations done by the customer are linear in the size of the sequences, and the computational cost and amount of communication done by the external agents are close to the time complexity of the best known algorithm for solving the problem on a single machine. © Springer-Verlag 2005.
引用
收藏
页码:277 / 287
页数:10
相关论文
共 50 条
  • [1] Secure outsourcing of sequence comparisons
    Atallah, MJ
    Li, JT
    PRIVACY ENHANCING TECHNOLOGIES, 2005, 3424 : 63 - 78
  • [2] Efficient and Verifiable Outsourcing Scheme of Sequence Comparisons
    Feng, Yansheng
    Ma, Hua
    Chen, Xiaofeng
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2015, 21 (01): : 51 - 63
  • [3] In search of secure outsourcing
    Comput. Fraud Secur., 2009, 2 (13-15):
  • [4] E-SC: Collusion-Resistant Secure Outsourcing of Sequence Comparison Algorithm
    Wang, Xiaofei
    Zhang, Yuqing
    IEEE ACCESS, 2018, 6 : 3358 - 3375
  • [5] Secure outsourcing of scientific computations
    Atallah, MJ
    Pantazopoulos, KN
    Rice, JR
    Spafford, EE
    ADVANCES IN COMPUTERS, VOL 54: TRENDS IN SOFTWARE ENGINEERING, 2001, 54 : 215 - 272
  • [6] Secure Outsourcing of Matrix Convolutions
    Zhang, Kaijin
    Luo, Changqing
    Li, Pan
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [7] Secure Outsourcing of Virtual Appliance
    Xia, Yubin
    Liu, Yutao
    Guan, Haibing
    Chen, Yunji
    Chen, Tianshi
    Zang, Binyu
    Chen, Haibo
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (03) : 390 - 404
  • [8] Secure Authenticated Comparisons
    Frikken, Keith B.
    Yuan, Hao
    Atallah, Mikhail J.
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2011), 2011, 6715 : 514 - 531
  • [9] Secure Outsourcing of Matrix Operations as a Service
    Nassar, Mohamad
    Erradi, Abdelkarim
    Sabri, Farida
    Malluhi, Qutaibah M.
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 918 - 925
  • [10] Secure Outsourcing of Geospatial Vector Data
    Chaudhari, Sangita
    Venkatachalam, Parvatham
    Buddhiraju, Krishna Mohan
    2019 IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM (IGARSS 2019), 2019, : 871 - 874