Efficient information-theoretically secure schemes for cloud data outsourcing

被引:0
|
作者
Somayeh Sobati-Moghadam
机构
[1] Hakim Sabzevari University,Department of Computer Engineering, Faculty of Electrical and Computer Engineering
来源
Cluster Computing | 2021年 / 24卷
关键词
Cloud computing; Data outsourcing; Data confidentiality; Cloud security; Homomorphic encryption; Secret splitting;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, outsourcing sensitive data to the cloud becomes popular. Outsourcing sensitive data to the cloud raises confidentiality concerns due to the loss of data control by the data owner. Data must be encrypted before outsourcing to ensure data confidentiality. However, when data is encrypted, a trade-off must be considered between efficiency and confidentiality. Homomorphic encryption allows computing over encrypted data, but its efficiency and overhead is still a great obstacle. In this paper, we propose a lightweight homomorphic encryption scheme with reduced computation and storage overhead. The proposed scheme presents a trade-off between a lower level of security and higher efficiency. The proposed scheme is formally verified, followed by a comprehensive discussion about confidentiality consideration.
引用
收藏
页码:3591 / 3606
页数:15
相关论文
共 50 条
  • [41] A Fast and Secure Scheme for Data Outsourcing in the Cloud
    Liu, Yanjun
    Wu, Hsiao-Ling
    Chang, Chin-Chen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (08): : 2708 - 2721
  • [42] Efficient and secure outsourcing of genomic data storage
    Sousa, Joao Sa
    Lefebvre, Cedric
    Huang, Zhicong
    Raisaro, Jean Louis
    Aguilar-Melchor, Carlos
    Killijian, Marc-Olivier
    Hubaux, Jean-Pierre
    BMC MEDICAL GENOMICS, 2017, 10
  • [43] Efficient and secure outsourcing of genomic data storage
    João Sá Sousa
    Cédric Lefebvre
    Zhicong Huang
    Jean Louis Raisaro
    Carlos Aguilar-Melchor
    Marc-Olivier Killijian
    Jean-Pierre Hubaux
    BMC Medical Genomics, 10
  • [44] Dynamic data integrity auditing for secure outsourcing in the cloud
    Wei, Jinxia
    Zhang, Ru
    Liu, Jianyi
    Li, Jing
    Niu, Xinxin
    Yao, Yuangang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (12):
  • [45] Efficient Secure Outsourcing Computation of Matrix Multiplication in Cloud Computing
    Zhang, Shenmin
    Li, Hongwei
    Jia, Kun
    Dai, Yunshun
    Zhao, Lian
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [46] Fast general methodology for information-theoretically optimal encodings of graphs
    He, X
    Kao, MY
    Lu, HI
    SIAM JOURNAL ON COMPUTING, 2000, 30 (03) : 838 - 846
  • [47] Information-Theoretically Secret Key Generation for Fading Wireless Channels
    Ye, Chunxuan
    Mathur, Suhas
    Reznik, Alex
    Shah, Yogendra
    Trappe, Wade
    Mandayam, Narayan B.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (02) : 240 - 254
  • [48] Spatial Modulation Achieves Information-Theoretically Optimal Energy Efficiency
    Takeuchi, Keigo
    IEEE COMMUNICATIONS LETTERS, 2015, 19 (07) : 1133 - 1136
  • [49] Information Theoretically Secure Data Relay Using QKD Network
    Fujiwara, Mikio
    Kato, Go
    Sasaki, Masahide
    IEEE ACCESS, 2024, 12 : 141167 - 141178
  • [50] GeoSecure: Towards Secure Outsourcing of GPS Data over Cloud
    Patil, Vikram
    Parikh, Shivam
    Singh, Priyanka
    Atrey, Pradeep K.
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 495 - 501