Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers
- 1 March 2016
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Dependable and Secure Computing
- Vol. 15 (1), 27-39
- https://doi.org/10.1109/tdsc.2016.2536601
Abstract
In this paper, we propose a framework for efficient and privacy-preserving outsourced calculation of rational numbers, which we refer to as POCR. Using POCR, a user can securely outsource the storing and processing of rational numbers to a cloud server without compromising the security of the (original) data and the computed results. We present the system architecture of POCR and the associated toolkits required in the privacy preserving calculation of integers and rational numbers to ensure that commonly used outsourced operations can be handled on-the-fly. We then prove that the proposed POCR achieves the goal of secure integer and rational number calculation without resulting in privacy leakage to unauthorized parties, and demonstrate the utility and the efficiency of POCR using simulations.Keywords
Funding Information
- Singapore Ministry of Education Academic Research Fund Tier 1 (14-C220-SMU-006)
- National Natural Science Foundation of China (No. 61370078, No. 61402109, No. 61502248, No. 61502400)
This publication has 25 references indexed in Scilit:
- An Efficient Privacy-Preserving Outsourced Computation over Public DataIEEE Transactions on Services Computing, 2015
- A Forensically Sound Adversary Model for Mobile DevicesPLOS ONE, 2015
- Plasma insulin, C‐peptide and blood glucose and the risk of gastric cancer: The Japan Public Health Center‐based prospective studyInternational Journal of Cancer, 2014
- Scale-Invariant Fully Homomorphic Encryption over the IntegersLecture Notes in Computer Science, 2014
- Efficiently Outsourcing Multiparty Computation Under Multiple KeysIEEE Transactions on Information Forensics and Security, 2013
- An efficient and probabilistic secure bit-decompositionPublished by Association for Computing Machinery (ACM) ,2013
- Fully homomorphic encryption using ideal latticesPublished by Association for Computing Machinery (ACM) ,2009
- Scientific Cloud Computing: Early Definition and ExperiencePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- How to share a secretCommunications of the ACM, 1979
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978