Title :
Computing encrypted cloud data efficiently under multiple keys
Author :
Boyang Wang ; Ming Li ; Chow, Sherman S. M. ; Hui Li
Author_Institution :
State Key Lab. of Integrated Service Networks, Xidian Univ., Xi´an, China
Abstract :
The emergence of cloud computing brings users abundant opportunities to utilize the power of cloud to perform computation on data contributed by multiple users. These cloud data should be encrypted under multiple keys due to privacy concerns. However, existing secure computation techniques are either limited to single key or still far from practical. In this paper, we design two efficient schemes for secure outsourced computation over cloud data encrypted under multiple keys. Our schemes employ two non-colluding cloud servers to jointly compute polynomial functions over multiple users´ encrypted cloud data without learning the inputs, intermediate or final results, and require only minimal interactions between the two cloud servers but not the users. We demonstrate our schemes´ efficiency experimentally via applications in machine learning. Our schemes are also applicable to privacy-preserving data aggregation such as in smart metering.
Keywords :
cloud computing; cryptography; data privacy; learning (artificial intelligence); polynomials; cloud computing; cloud servers; data computation; encrypted cloud data computing; machine learning; multiple keys; noncolluding cloud servers; polynomial functions; privacy concerns; privacy-preserving data aggregation; secure computation techniques; smart metering; Ash; Cloud computing; Computational modeling; Encryption; Servers;
Conference_Titel :
Communications and Network Security (CNS), 2013 IEEE Conference on
Conference_Location :
National Harbor, MD
DOI :
10.1109/CNS.2013.6682768