• DocumentCode
    1782764
  • Title

    A tale of two clouds: Computing on data encrypted under multiple keys

  • Author

    Boyang Wang ; Ming Li ; Chow, Sherman S. M. ; Hui Li

  • Author_Institution
    Dept. of Comput. Sci., Utah State Univ., Logan, UT, USA
  • fYear
    2014
  • fDate
    29-31 Oct. 2014
  • Firstpage
    337
  • Lastpage
    345
  • Abstract
    Cloud computing provides a convenient platform for big data computation such as machine learning and data mining. However, privacy conscious users often encrypt their data with their own keys before uploading them to the cloud. Existing techniques for computation on encrypted data are either in the single key setting or far from practical. In this paper, we show how two non-colluding servers can leverage proxy re-encryption to jointly compute arithmetic functions over the ciphertexts of multiple users without learning the inputs, intermediate or final results. Moreover, the computation is non-interactive to users and only requires minimal server-to-server interactions. Experimental results demonstrate that our schemes significantly improve the efficiency of outsourced computation when compared to the existing approach.
  • Keywords
    Big Data; cloud computing; cryptography; data mining; data privacy; learning (artificial intelligence); Big Data computation; arithmetic functions; ciphertexts; cloud computing; data encryption; data mining; machine learning; noncolluding servers; privacy; proxy reencryption; server-to-server interactions; Ash; Computational modeling; Encryption; Public key; Servers;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications and Network Security (CNS), 2014 IEEE Conference on
  • Conference_Location
    San Francisco, CA
  • Type

    conf

  • DOI
    10.1109/CNS.2014.6997502
  • Filename
    6997502