A tale of two clouds: Computing on data encrypted under multiple keys

Boyang Wang, Ming Li, Sherman S.M. Chow, Hui Li

Research output: Chapter in Book/Report/Conference proceedingConference contribution

50 Scopus citations

Abstract

Cloud computing provides a convenient platform for big data computation such as machine learning and data mining. However, privacy conscious users often encrypt their data with their own keys before uploading them to the cloud. Existing techniques for computation on encrypted data are either in the single key setting or far from practical. In this paper, we show how two non-colluding servers can leverage proxy re-encryption to jointly compute arithmetic functions over the ciphertexts of multiple users without learning the inputs, intermediate or final results. Moreover, the computation is non-interactive to users and only requires minimal server-to-server interactions. Experimental results demonstrate that our schemes significantly improve the efficiency of outsourced computation when compared to the existing approach.

Original languageEnglish (US)
Title of host publication2014 IEEE Conference on Communications and Network Security, CNS 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages337-345
Number of pages9
ISBN (Electronic)9781479958900
DOIs
StatePublished - Dec 23 2014
Externally publishedYes
Event2014 IEEE Conference on Communications and Network Security, CNS 2014 - San Francisco, United States
Duration: Oct 29 2014Oct 31 2014

Publication series

Name2014 IEEE Conference on Communications and Network Security, CNS 2014

Conference

Conference2014 IEEE Conference on Communications and Network Security, CNS 2014
Country/TerritoryUnited States
CitySan Francisco
Period10/29/1410/31/14

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'A tale of two clouds: Computing on data encrypted under multiple keys'. Together they form a unique fingerprint.

Cite this