PRIVACY-PRESERVING COMPUTATION WITH AN EXTENDED FRAMEWORK AND FLEXIBLE ACCESS CONTROL

V. Rajkumar Research Scholar, Dept. of Computer Science, AVVM Sri Pushpam College, Poondi, Thanjavur
Dr. V. Maniraj Research Advisor, PG and Research Dept. of Computer Science, AVVM Sri Pushpam College, Poondi, Thanjavur. (Affiliated to Bharathidasan University) ORCID ID: 0000-0002-8113-2616

Abstract

With cloud computing, you have numerous services that are built on data that has been outsourced by employing the tremendous number of resources and tremendous computer power. But it also renders consumers incapable of retaining total control over their personal data. When it comes to keeping data private, users' personal information should be encrypted and sent to the cloud to prevent it from leaking. However, this increases the difficulty of data analysis and access control. Moreover, few existing efforts make use of fine-grained access control for cryptographic computational outputs, which remain out of the reach of many researchers. However, in the process of our prior work, a system for supporting various basic components (such as comparison, multiplication, and addition) was presented that was based on a framework that was more than flexible. Our framework was designed to support a range of computational tasks while still respecting privacy. To deal with this shortcoming, we present privacy-preserving of four division techniques of computation along with customizable control access. However, here we expand a division technique over integers that is encrypted to provide division on privacy-preserving on other information types, which includes numbers that are either fixed-point (meaning the size is an integer value) or fractional (meaning the size is not a whole number). Finally, we present their proof of security and detail their inefficiency and lack of superiority.

Keywords:


Full Text:

PDF


References


1) M. Franz, B. Deiseroth, K. Hamacher, S. Jha, S. Katzenbeisser, and H. Schr¨oder, “Secure computations onnon-integer values,” in 2010 IEEE International Workshop on Information Forensics and Security, WIFS 2010, Seattle, WA, USA, December 12-15, 2010, 2010, pp. 1–6. 2) M. Dahl, C. Ning, and T. Toft, “On secure two-party integer division,” in Financial Cryptography and Data Security - 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers, 2012, pp. 164–178. 3) C. Ugwuoke, Z. Erkin, and R. L. Lagendijk, “Secure fixed-point division for homomorphically encrypted operands,” in Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018, 2018, pp. 33:1–33:10. 4) Location Privacy-Preserving Distance Computation for Spatial Crowdsourcing: Song Han;Jianhong Lin;Shuai Zhao;Guangquan Xu;Siqi Ren;Daojing He;Licheng Wang;Leyun Shi, IEEE Internet of Things Journal_2020. 5) Comments on “An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys”: Chen Li;Wenping Ma, IEEE Transactions on Information Forensics and Security_2018. 6) An Efficient Framework for Privacy-Preserving Computations on Encrypted IoT Data: Shruthi Ramesh;Manimaran Govindarasu, IEEE Internet of Things Journal_2020. 7) LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs: Jun Zhou;Zhenfu Cao;Zhan Qin;Xiaolei Dong;Kui Ren, IEEE Transactions on Information Forensics and Security_2020. 8) Lightweight Privacy-Preserving Scheme in Wi-Fi Fingerprint-Based Indoor Localization: Guanglin Zhang;Anqi Zhang;Ping Zhao;Jiaxin Sun, IEEE Systems Journal_2020. 9) An Extended Framework of Privacy-Preserving Computation With Flexible Access Control: Wenxiu Ding;Rui Hu;Zheng Yan;Xinren Qian;Robert H. Deng;Laurence T. Yang;Mianxiong Dong, IEEE Transactions on Network and Service Management_2020. 10) Privacy-Preserving Traffic Flow Prediction: A Federated Learning Approach: Yi Liu;James J. Q. Yu;Jiawen Kang;Dusit Niyato;Shuyu Zhang, IEEE Internet of Things Journal_2020. 11) Privacy-Preserving Computation Offloading for Parallel Deep Neural Networks Training: Yunlong Mao;Wenbo Hong;Heng Wang;Qun Li;Sheng Zhong, IEEE Transactions on Parallel and Distributed Systems_2021. 12) On the Privacy of Matrix Masking-Based Verifiable (Outsourced) Computation: Liang Zhao;Liqun Chen, IEEE Transactions on Cloud Computing_2020. 13) Efficient Privacy Preserving Data Collection and Computation Offloading for Fog-Assisted IoT: Siguang Chen;Xi Zhu;Haijun Zhang;Chuanxin Zhao;Geng Yang;Kun Wang, IEEE Transactions on Sustainable Computing_2020. 14) Privacy Preserving Collaborative Computing: Heterogeneous Privacy Guarantee and Efficient Incentive Mechanism: in Wang;Jianping He;Peng Cheng;Jiming Chen, IEEE Transactions on Signal Processing_2019. 15) Prospect Theoretic Analysis of Privacy-Preserving Mechanism: Guocheng Liao;Xu Chen;Jianwei Huang, IEEE/ACM Transactions on Networking_2020. 16) Privacy-Preserving Double-Projection Deep Computation Model With Crowdsourcing on Cloud for Big Data Feature Learning: Qingchen Zhang;Laurence T. Yang;Zhikui Chen;Peng Li;M. Jamal Deen, IEEE Internet of Things Journal_2018. 17) A Comment on Privacy-Preserving Scalar Product Protocols as Proposed in “SPOC”: Thomas Schneider;Amos Treiber, IEEE Transactions on Parallel and Distributed Systems_2020. 18) Scalar Product Lattice Computation for Efficient Privacy-Preserving Systems: Yogachandran Rahulamathavan;Safak Dogan;Xiyu Shi;Rongxing Lu;Muttukrishnan Rajarajan;Ahmet Kondoz, IEEE Internet of Things Journal_2021. 19) Privacy-Preserving Top- k Route Computation in Indoor Environments: Dae-Ho Kim;Beakcheol Jang;Jong Wook Kim, IEEE Access_2018. 20) Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data: Shuo Qiu;Boyang Wang;Ming Li;Jiqiang Liu;Yanfeng Shi, IEEE Transactions on Cloud Computing_2020. 21) Privacy-Preserving Location-Based Services Query Scheme Against Quantum Attacks: Ziyuan Hu;Shengli Liu;Kefei Chen, IEEE Transactions on Dependable and Secure Computing_2020.

Refbacks

  • There are currently no refbacks.