Efficient information-theoretically secure schemes for cloud data outsourcing

被引:0
|
作者
Somayeh Sobati-Moghadam
机构
[1] Hakim Sabzevari University,Department of Computer Engineering, Faculty of Electrical and Computer Engineering
来源
Cluster Computing | 2021年 / 24卷
关键词
Cloud computing; Data outsourcing; Data confidentiality; Cloud security; Homomorphic encryption; Secret splitting;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, outsourcing sensitive data to the cloud becomes popular. Outsourcing sensitive data to the cloud raises confidentiality concerns due to the loss of data control by the data owner. Data must be encrypted before outsourcing to ensure data confidentiality. However, when data is encrypted, a trade-off must be considered between efficiency and confidentiality. Homomorphic encryption allows computing over encrypted data, but its efficiency and overhead is still a great obstacle. In this paper, we propose a lightweight homomorphic encryption scheme with reduced computation and storage overhead. The proposed scheme presents a trade-off between a lower level of security and higher efficiency. The proposed scheme is formally verified, followed by a comprehensive discussion about confidentiality consideration.
引用
收藏
页码:3591 / 3606
页数:15
相关论文
共 50 条
  • [31] Information-theoretically secure oblivious polynomial evaluation in the commodity-based model
    Tonicelli, Rafael
    Nascimento, Anderson C. A.
    Dowsley, Rafael
    Mueller-Quade, Joern
    Imai, Hideki
    Hanaoka, Goichiro
    Otsuka, Akira
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (01) : 73 - 84
  • [32] Efficient Architecture for Secure Outsourcing of Data and Computation in Hybrid Cloud
    Lunawat, Sonali
    Patankar, Abhijit
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 380 - 383
  • [33] Information-Theoretically Secure Multi-Party Linear Regression and Logistic Regression
    Zhou, Hengcheng
    2023 IEEE/ACM 23RD INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING WORKSHOPS, CCGRIDW, 2023, : 192 - 199
  • [34] Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data
    Gupta, Peeyush
    Li, Yin
    Mehrotra, Sharad
    Panwar, Nisha
    Sharma, Shantanu
    Almanee, Sumaya
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (02) : 843 - 864
  • [35] Information-theoretically secure oblivious polynomial evaluation in the commodity-based model
    Rafael Tonicelli
    Anderson C. A. Nascimento
    Rafael Dowsley
    Jörn Müller-Quade
    Hideki Imai
    Goichiro Hanaoka
    Akira Otsuka
    International Journal of Information Security, 2015, 14 : 73 - 84
  • [36] Information-theoretically Optimal Sparse PCA
    Deshpande, Yash
    Montanari, Andrea
    2014 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2014, : 2197 - 2201
  • [37] Security research on an information-theoretically secure secret key agreement using LDPC matrices
    Yu, Jia
    Luo, Yuan
    Li, Minglu
    PROCEEDINGS OF THE THIRD CHINAGRID ANNUAL CONFERENCE, 2008, : 197 - 201
  • [38] Privacy and correctness trade-offs for information-theoretically secure quantum homomorphic encryption
    Hu, Yanglin
    Ouyang, Yingkai
    Tomamichel, Marco
    QUANTUM, 2023, 7
  • [39] A Comparative Study of Attribute-Based Encryption Schemes for Secure Cloud Data Outsourcing
    Thangavel, M.
    Varalakshmi, P.
    Abinaya, C.
    2017 NINTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 261 - 266
  • [40] Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing
    Luo, Yuchuan
    Xu, Ming
    Huang, Kai
    Wang, Dongsheng
    Fu, Shaojing
    COMPUTERS & SECURITY, 2018, 73 : 492 - 506