Lightning-fast and privacy-preserving outsourced computation in the cloud

被引:0
|
作者
Ximeng Liu
Robert H. Deng
Pengfei Wu
Yang Yang
机构
[1] College of Mathematics and Computer Science,
[2] Fuzhou University,undefined
[3] School of Information Systems,undefined
[4] Singapore Management University,undefined
[5] School of Software and Microelectronics,undefined
[6] Peking University,undefined
来源
关键词
Privacy-preserving; Secure outsourced computation; Homomorphic encryption; Secret sharing technique; Against side-channel attack;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we propose a framework for lightning-fast privacy-preserving outsourced computation framework in the cloud, which we refer to as LightCom. Using LightCom, a user can securely achieve the outsource data storage and fast, secure data processing in a single cloud server different from the existing multi-server outsourced computation model. Specifically, we first present a general secure computation framework for LightCom under the cloud server equipped with multiple Trusted Processing Units (TPUs), which face the side-channel attack. Under the LightCom, we design two specified fast processing toolkits, which allow the user to achieve the commonly-used secure integer computation and secure floating-point computation against the side-channel information leakage of TPUs, respectively. Furthermore, our LightCom can also guarantee access pattern protection during the data processing and achieve private user information retrieve after the computation. We prove that the proposed LightCom can successfully achieve the goal of single cloud outsourced data processing to avoid the extra computation server and trusted computation server, and demonstrate the utility and the efficiency of LightCom using simulations.
引用
收藏
相关论文
共 50 条
  • [1] Lightning-fast and privacy-preserving outsourced computation in the cloud
    Liu, Ximeng
    Deng, Robert H.
    Wu, Pengfei
    Yang, Yang
    [J]. CYBERSECURITY, 2020, 3 (01)
  • [2] Privacy-preserving face recognition with outsourced computation
    Xiang, Can
    Tang, Chunming
    Cai, Yunlu
    Xu, Qiuxia
    [J]. SOFT COMPUTING, 2016, 20 (09) : 3735 - 3744
  • [3] Privacy-preserving face recognition with outsourced computation
    Can Xiang
    Chunming Tang
    Yunlu Cai
    Qiuxia Xu
    [J]. Soft Computing, 2016, 20 : 3735 - 3744
  • [4] Efficient and privacy-preserving outsourced unbounded inner product computation in cloud computing
    Yan, Jiayun
    Chen, Jie
    Qian, Chen
    Fu, Anmin
    Qian, Haifeng
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 153
  • [5] Privacy-Preserving Outsourced Calculation Toolkit in the Cloud
    Liu, Ximeng
    Deng, Robert H.
    Choo, Kim-Kwang Raymond
    Yang, Yang
    Pang, HweeHwa
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (05) : 898 - 911
  • [6] Privacy-preserving outsourced classification in cloud computing
    Ping Li
    Jin Li
    Zhengan Huang
    Chong-Zhi Gao
    Wen-Bin Chen
    Kai Chen
    [J]. Cluster Computing, 2018, 21 : 277 - 286
  • [7] Privacy-preserving outsourced classification in cloud computing
    Li, Ping
    Li, Jin
    Huang, Zhengan
    Gao, Chong-Zhi
    Chen, Wen-Bin
    Chen, Kai
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01): : 277 - 286
  • [8] Privacy-Preserving Outsourced Feature Extractions in the Cloud: A Survey
    Wang, Jingjun
    Hu, Shengshan
    Wang, Qian
    Ma, Yutao
    [J]. IEEE NETWORK, 2017, 31 (05): : 36 - 41
  • [9] Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases
    Thompson, Brian
    Haber, Stuart
    Horne, William G.
    Sander, Tomas
    Yao, Danfeng
    [J]. PRIVACY ENHANCING TECHNOLOGIES, PROCEEDINGS, 2009, 5672 : 185 - +
  • [10] Privacy-preserving biometric verification with outsourced correlation filter computation
    Taheri, Motahareh
    Mozaffari, Saeed
    Keshavarzi, Parviz
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (14) : 21425 - 21448