Efficient information-theoretically secure schemes for cloud data outsourcing

被引:0
|
作者
Somayeh Sobati-Moghadam
机构
[1] Hakim Sabzevari University,Department of Computer Engineering, Faculty of Electrical and Computer Engineering
来源
Cluster Computing | 2021年 / 24卷
关键词
Cloud computing; Data outsourcing; Data confidentiality; Cloud security; Homomorphic encryption; Secret splitting;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, outsourcing sensitive data to the cloud becomes popular. Outsourcing sensitive data to the cloud raises confidentiality concerns due to the loss of data control by the data owner. Data must be encrypted before outsourcing to ensure data confidentiality. However, when data is encrypted, a trade-off must be considered between efficiency and confidentiality. Homomorphic encryption allows computing over encrypted data, but its efficiency and overhead is still a great obstacle. In this paper, we propose a lightweight homomorphic encryption scheme with reduced computation and storage overhead. The proposed scheme presents a trade-off between a lower level of security and higher efficiency. The proposed scheme is formally verified, followed by a comprehensive discussion about confidentiality consideration.
引用
收藏
页码:3591 / 3606
页数:15
相关论文
共 50 条
  • [1] Efficient information-theoretically secure schemes for cloud data outsourcing
    Sobati-Moghadam, Somayeh
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (04): : 3591 - 3606
  • [2] Recent Advances in Information-Theoretically Secure Data Outsourcing
    Mehrotra, Sharad
    Sharma, Shantanu
    PROCEEDINGS OF THE SIXTH INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS (IWSPA'20), 2020, : 31 - 32
  • [3] On the Security of Pseudorandomized Information-Theoretically Secure Schemes
    Nuida, Koji
    Hanaoka, Goichiro
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (01) : 635 - 652
  • [4] On the Security of Pseudorandomized Information-Theoretically Secure Schemes
    Nuida, Koji
    Hanaoka, Goichiro
    INFORMATION THEORETIC SECURITY, 2010, 5973 : 56 - 73
  • [5] Information-theoretically secure keyless authentication
    Korjik, V
    Bakin, M
    2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 20 - 20
  • [6] Information-Theoretically Secure and Highly Efficient Search and Row Retrieval
    Sharma, Shantanu
    Li, Yin
    Mehrotra, Sharad
    Panwar, Nisha
    Kumari, Komal
    Roychoudhury, Swagnik
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2023, 16 (10): : 2391 - 2403
  • [7] Information-Theoretically Secure Key Generation and Management
    Yang, En-Hui
    Wu, Xin-Wen
    2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 1529 - 1533
  • [8] On Optimal Information-Theoretically Secure Key Management
    Yang, En-Hui
    Wu, Xin-Wen
    2019 16TH CANADIAN WORKSHOP ON INFORMATION THEORY (CWIT), 2019,
  • [9] Parallel reducibility for information-theoretically secure computation
    Dodis, Y
    Micali, S
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 74 - 92
  • [10] Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources
    Nikolopoulos, Georgios M.
    Fischlin, Marc
    CRYPTOGRAPHY, 2020, 4 (04) : 1 - 10