TY - GEN
T1 - Computing encrypted cloud data efficiently under multiple keys
AU - Wang, Boyang
AU - Li, Ming
AU - Chow, Sherman S.M.
AU - Li, Hui
PY - 2013
Y1 - 2013
N2 - The emergence of cloud computing brings users abundant opportunities to utilize the power of cloud to perform computation on data contributed by multiple users. These cloud data should be encrypted under multiple keys due to privacy concerns. However, existing secure computation techniques are either limited to single key or still far from practical. In this paper, we design two efficient schemes for secure outsourced computation over cloud data encrypted under multiple keys. Our schemes employ two non-colluding cloud servers to jointly compute polynomial functions over multiple users' encrypted cloud data without learning the inputs, intermediate or final results, and require only minimal interactions between the two cloud servers but not the users. We demonstrate our schemes' efficiency experimentally via applications in machine learning. Our schemes are also applicable to privacy-preserving data aggregation such as in smart metering.
AB - The emergence of cloud computing brings users abundant opportunities to utilize the power of cloud to perform computation on data contributed by multiple users. These cloud data should be encrypted under multiple keys due to privacy concerns. However, existing secure computation techniques are either limited to single key or still far from practical. In this paper, we design two efficient schemes for secure outsourced computation over cloud data encrypted under multiple keys. Our schemes employ two non-colluding cloud servers to jointly compute polynomial functions over multiple users' encrypted cloud data without learning the inputs, intermediate or final results, and require only minimal interactions between the two cloud servers but not the users. We demonstrate our schemes' efficiency experimentally via applications in machine learning. Our schemes are also applicable to privacy-preserving data aggregation such as in smart metering.
UR - http://www.scopus.com/inward/record.url?scp=84893597100&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84893597100&partnerID=8YFLogxK
U2 - 10.1109/CNS.2013.6682768
DO - 10.1109/CNS.2013.6682768
M3 - Conference contribution
AN - SCOPUS:84893597100
SN - 9781479908950
T3 - 2013 IEEE Conference on Communications and Network Security, CNS 2013
SP - 504
EP - 513
BT - 2013 IEEE Conference on Communications and Network Security, CNS 2013
PB - IEEE Computer Society
T2 - 1st IEEE International Conference on Communications and Network Security, CNS 2013
Y2 - 14 October 2013 through 16 October 2013
ER -