Efficient and privacy-preserving outsourced unbounded inner product computation in cloud computing

被引:0
|
作者
Yan, Jiayun [1 ]
Chen, Jie [1 ]
Qian, Chen [2 ,3 ]
Fu, Anmin [4 ]
Qian, Haifeng [1 ]
机构
[1] East China Normal Univ, Sch Software Engn, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[2] Shandong Univ, Minist Educ, Key Lab Cryptol Technol & Informat Secur, Qingdao 266000, Peoples R China
[3] Shandong Univ, Sch Cyber Sci & Technol, Qingdao 266000, Peoples R China
[4] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210000, Peoples R China
基金
中国国家自然科学基金;
关键词
Functional encryption; Inner product computation; Outsourced computing; Large-scale data; Computational cost; ENCRYPTION; CHALLENGES;
D O I
10.1016/j.sysarc.2024.103190
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In cloud computing, the current challenge lies in managing massive data, which is a computationally overburdened environment for data users. Outsourced computation can effectively ease the memory and computation pressure on overburdened data storage. We propose an outsourced unbounded decryption scheme in the standard assumption and standard model for large data settings based on inner product computation. Security analysis shows that it can achieve adaptive security. The scheme involves the data owner transmitting encrypted data to a third -party cloud server, which is responsible for computing a significant amount of data. Then the ripe data is handed over to the data user for decryption computation. In addition, there is no need to give the prior bounds of the length of the plaintext vector in advance. This allows for the encryption algorithm to run without determining the length of the input data before the setup phase, that is, our scheme is on the unbounded setting. Through theoretical analysis, the storage overhead and communication cost of the data users remain independent of the ciphertext size. The experimental results indicate that the efficiency and performance are greatly enhanced, about 0.03S for data users at the expense of increased computing time on the cloud server.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Privacy-Preserving Outsourced Inner Product Computation on Encrypted Database
    Yang, Haining
    Su, Ye
    Qin, Jing
    Wang, Huaxiong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1320 - 1337
  • [2] Privacy-preserving outsourced classification in cloud computing
    Ping Li
    Jin Li
    Zhengan Huang
    Chong-Zhi Gao
    Wen-Bin Chen
    Kai Chen
    Cluster Computing, 2018, 21 : 277 - 286
  • [3] Privacy-preserving outsourced classification in cloud computing
    Li, Ping
    Li, Jin
    Huang, Zhengan
    Gao, Chong-Zhi
    Chen, Wen-Bin
    Chen, Kai
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01): : 277 - 286
  • [4] Lightning-fast and privacy-preserving outsourced computation in the cloud
    Ximeng Liu
    Robert H. Deng
    Pengfei Wu
    Yang Yang
    Cybersecurity, 3
  • [5] Lightning-fast and privacy-preserving outsourced computation in the cloud
    Liu, Ximeng
    Deng, Robert H.
    Wu, Pengfei
    Yang, Yang
    CYBERSECURITY, 2020, 3 (01)
  • [6] An Efficient Privacy-Preserving Outsourced Computation over Public Data
    Liu, Ximeng
    Qin, Baodong
    Deng, Robert H.
    Li, Yingjiu
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2017, 10 (05) : 756 - 770
  • [7] Efficient and Privacy-Preserving Outsourced SVM Classification in Public Cloud
    Liang, Jinwen
    Qin, Zheng
    Ni, Jianbing
    Lin, Xiaodong
    Shen, Xuemin
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [8] A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing
    Qin, Zhen
    Sun, Jianfei
    Wahaballa, Abubaker
    Zheng, Wentao
    Xiong, Hu
    Qin, Zhiguang
    COMPUTER STANDARDS & INTERFACES, 2017, 54 : 55 - 60
  • [9] Privacy-preserving face recognition with outsourced computation
    Xiang, Can
    Tang, Chunming
    Cai, Yunlu
    Xu, Qiuxia
    SOFT COMPUTING, 2016, 20 (09) : 3735 - 3744
  • [10] Privacy-preserving face recognition with outsourced computation
    Can Xiang
    Chunming Tang
    Yunlu Cai
    Qiuxia Xu
    Soft Computing, 2016, 20 : 3735 - 3744