Efficient information-theoretically secure schemes for cloud data outsourcing

被引:0
|
作者
Somayeh Sobati-Moghadam
机构
[1] Hakim Sabzevari University,Department of Computer Engineering, Faculty of Electrical and Computer Engineering
来源
Cluster Computing | 2021年 / 24卷
关键词
Cloud computing; Data outsourcing; Data confidentiality; Cloud security; Homomorphic encryption; Secret splitting;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, outsourcing sensitive data to the cloud becomes popular. Outsourcing sensitive data to the cloud raises confidentiality concerns due to the loss of data control by the data owner. Data must be encrypted before outsourcing to ensure data confidentiality. However, when data is encrypted, a trade-off must be considered between efficiency and confidentiality. Homomorphic encryption allows computing over encrypted data, but its efficiency and overhead is still a great obstacle. In this paper, we propose a lightweight homomorphic encryption scheme with reduced computation and storage overhead. The proposed scheme presents a trade-off between a lower level of security and higher efficiency. The proposed scheme is formally verified, followed by a comprehensive discussion about confidentiality consideration.
引用
收藏
页码:3591 / 3606
页数:15
相关论文
共 50 条
  • [21] PERCOLATION ON THE INFORMATION-THEORETICALLY SECURE SIGNAL TO INTERFERENCE RATIO GRAPH
    Vaze, Rahul
    Iyer, Srikanth
    JOURNAL OF APPLIED PROBABILITY, 2014, 51 (04) : 910 - 920
  • [22] ITSEC: An Information-theoretically Secure Framework for Truthful Spectrum Auctions
    Chen, Zhili
    Huang, Liusheng
    Chen, Lin
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [23] Information-Theoretically Secure Key-Insulated Key-Agreement
    Seito, Takenobu
    Shikata, Junji
    2011 IEEE INFORMATION THEORY WORKSHOP (ITW), 2011,
  • [24] Rational Secret Sharing Information-theoretically Secure Against Adaptive Adversaries
    Yu, Yang
    Zhou, Zhanfei
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 249 - 256
  • [25] Information-Theoretically Secure String Commitments Based on Packet Reordering Channels
    de Morais Alves, Vinicius
    Dowsley, Rafael
    de Sousa, Rafael Timoteo, Jr.
    Nascimento, Anderson C. A.
    IEEE ACCESS, 2021, 9 : 139928 - 139945
  • [26] Information-Theoretically Secure Entity Authentication in the Multi-user Setting
    Hajime, Shogo
    Watanabe, Yohei
    Shikata, Junji
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 400 - 417
  • [27] Information-theoretically secure key insulated encryption: Models, bounds and constructions
    Hanaoka, Y
    Hanaoka, G
    Shikata, J
    Imai, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (10) : 2521 - 2532
  • [28] Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes
    Seito, Takenobu
    Aikawa, Tadashi
    Shikata, Junji
    Matsumoto, Tsutomu
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 148 - 165
  • [29] Experimental analysis and comparative study of secure data outsourcing schemes in cloud
    Sudarsan Rao V.
    Satyanarayana N.
    International Journal of Cloud Computing, 2019, 8 (01) : 83 - 101
  • [30] Information-Theoretically Secure Three-Party Computation with One Corrupted Party
    Wang, Ye
    Ishwar, Prakash
    Rane, Shantanu
    2013 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2013, : 3160 - +