Title :
A tale of two clouds: Computing on data encrypted under multiple keys
Author :
Boyang Wang ; Ming Li ; Chow, Sherman S. M. ; Hui Li
Author_Institution :
Dept. of Comput. Sci., Utah State Univ., Logan, UT, USA
Abstract :
Cloud computing provides a convenient platform for big data computation such as machine learning and data mining. However, privacy conscious users often encrypt their data with their own keys before uploading them to the cloud. Existing techniques for computation on encrypted data are either in the single key setting or far from practical. In this paper, we show how two non-colluding servers can leverage proxy re-encryption to jointly compute arithmetic functions over the ciphertexts of multiple users without learning the inputs, intermediate or final results. Moreover, the computation is non-interactive to users and only requires minimal server-to-server interactions. Experimental results demonstrate that our schemes significantly improve the efficiency of outsourced computation when compared to the existing approach.
Keywords :
Big Data; cloud computing; cryptography; data mining; data privacy; learning (artificial intelligence); Big Data computation; arithmetic functions; ciphertexts; cloud computing; data encryption; data mining; machine learning; noncolluding servers; privacy; proxy reencryption; server-to-server interactions; Ash; Computational modeling; Encryption; Public key; Servers;
Conference_Titel :
Communications and Network Security (CNS), 2014 IEEE Conference on
Conference_Location :
San Francisco, CA
DOI :
10.1109/CNS.2014.6997502