DPP: Data Privacy-Preserving for Cloud Computing based on Homomorphic Encryption

被引:3
作者
Wang, Jing [1 ]
Wu, Fengheng [2 ]
Zhang, Tingbo [1 ]
Wu, Xiaohua [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Chengdu 610051, Peoples R China
[2] Chengdu Sea&Dune Technol Co Ltd, Chengdu, Peoples R China
来源
2022 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, CYBERC | 2022年
基金
中国国家自然科学基金;
关键词
cloud computing; homomorphic encryption; privacy; preserving;
D O I
10.1109/CyberC55534.2022.00016
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing has been widely used because of its low price, high reliability, and generality of services. However, considering that cloud computing transactions between users and service providers are usually asynchronous, data privacy involving users and service providers may lead to a crisis of trust, which in turn hinders the expansion of cloud computing applications. In this paper, we propose DPP, a data privacypreserving cloud computing scheme based on homomorphic encryption, which achieves correctness, compatibility, and security. DPP implements data privacy-preserving by introducing homomorphic encryption. To verify the security of DPP, we instantiate DPP based on the Paillier homomorphic encryption scheme and evaluate the performance. The experiment results show that the time-consuming of the key steps in the DPP scheme is reasonable and acceptable.
引用
收藏
页码:29 / 32
页数:4
相关论文
共 9 条
[1]  
Fahsi Mahmoud, 2015, International Journal of Modern Education and Computer Science, V7, P16, DOI 10.5815/ijmecs.2015.05.03
[2]  
Fan J., 2012, IACR Cryptol. ePrint Arch
[3]   Fully Homomorphic Encryption Using Ideal Lattices [J].
Gentry, Craig .
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, :169-178
[4]  
Li HG, 2017, Arxiv, DOI arXiv:1711.01030
[5]   Full Verifiability for Outsourced Decryption in Attribute Based Encryption [J].
Li, Jiguo ;
Wang, Yao ;
Zhang, Yichen ;
Han, Jinguang .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2020, 13 (03) :478-487
[6]  
Paillier P, 1999, LECT NOTES COMPUT SC, V1592, P223
[7]   Cloud security issues and challenges: A survey [J].
Singh, Ashish ;
Chatterjee, Kakali .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 79 :88-115
[8]  
Singh SR, 2016, 2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT), P13, DOI 10.1109/ICACDOT.2016.7877543
[9]   Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing [J].
Zhang, Yinghui ;
Deng, Robert H. ;
Liu, Ximeng ;
Zheng, Dong .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (04) :1152-1166