DocumentCode :
1951710
Title :
Secure computation for data privacy
Author :
Singh, Meena ; Saxena, Ashutosh
Author_Institution :
Application Security and Privacy Group, SET Labs, Infosys Technologies Limited, Hyderabad, Andhra Pradesh, INDIA, 500019
fYear :
2007
fDate :
17-21 Sept. 2007
Firstpage :
58
Lastpage :
62
Abstract :
The Secure Mobile Code is a fragment of code being executed in some unfamiliar and untrusted environment. Protecting integrity and maintaining confidentially of the code execution in unfamiliar environment has been a challenging task. The host environment may try to guess the functionality of the code received. This generates a need to design a scheme that can perform secure computation on encoded data and leaving no clues for the host to guess the functionality and data. In our scheme, the sender will generate the code which is transformed to hide the functionality and she will send it along with encoded data to the host. Subsequently, the host will run the code on the encoded data and send the result to the sender. The functionality is protected by the encoded gates where the truth table is transformed using the Reducible Rank Codes[1]. We also present a detail security analysis and complexity of our scheme. Our scheme finds application where the data computation has been outsourced to other party.
Keywords :
Circuits; Cryptography; Data privacy; Data security; Diseases; Filtering; Internet; Mobile computing; Monitoring; Protection; Data Privacy; Mobile Code; Reducible Rank Code; Secure Computation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007. Third International Conference on
Conference_Location :
Nice, France
Print_ISBN :
978-1-4244-0974-7
Electronic_ISBN :
978-1-4244-0975-4
Type :
conf
DOI :
10.1109/SECCOM.2007.4550308
Filename :
4550308
Link To Document :
بازگشت