Skip to main content
Top

2020 | OriginalPaper | Chapter

Homomorphic Data Concealment Powered by Clifford Geometric Algebra

Authors : David W. H. A. da Silva, Marcelo A. Xavier, Philip N. Brown, Edward Chow, Carlos Paz de Araujo

Published in: Advances in Computer Graphics

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We propose general-purpose methods for data representation and data concealment via multivector decompositions and a small subset of functions in the three dimensional Clifford geometric algebra. We demonstrate mechanisms that can be explored for purposes from plain data manipulation to homomorphic data processing with multivectors. The wide variety of algebraic representations in Clifford geometric algebra allow us to explore concepts from integer, complex, vector and matrix arithmetic within a single, compact, flexible and yet powerful algebraic structure in order to propose novel homomorphisms. Our constructions can be incorporated into existing applications as add-ons as well as used to provide standalone data-centric algorithms. We implement our representation and concealment mechanisms in the Ruby programming language to demonstrate the ideas discussed in this work.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Augello, A., Gentile, M., Pilato, G., Vassallo, G.: Geometric encoding of sentences based on Clifford algebra. In: KDIR, pp. 457–462 (2012) Augello, A., Gentile, M., Pilato, G., Vassallo, G.: Geometric encoding of sentences based on Clifford algebra. In: KDIR, pp. 457–462 (2012)
2.
go back to reference Bakken, D.E., Rarameswaran, R., Blough, D.M., Franz, A.A., Palmer, T.J.: Data obfuscation: anonymity and desensitization of usable data sets. IEEE Secur. Priv. 2(6), 34–41 (2004)CrossRef Bakken, D.E., Rarameswaran, R., Blough, D.M., Franz, A.A., Palmer, T.J.: Data obfuscation: anonymity and desensitization of usable data sets. IEEE Secur. Priv. 2(6), 34–41 (2004)CrossRef
4.
go back to reference Bellinger, G., Castro, D., Mills, A.: Data, information, knowledge, and wisdom. ufmg.br (2004) Bellinger, G., Castro, D., Mills, A.: Data, information, knowledge, and wisdom. ufmg.br (2004)
5.
go back to reference Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3.4), 313–336 (1996)CrossRef Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Syst. J. 35(3.4), 313–336 (1996)CrossRef
7.
go back to reference Chappell, J.M., Iqbal, A., Gunn, L.J., Abbott, D.: Functions of multivector variables. PloS One 10(3), e0116943 (2015)CrossRef Chappell, J.M., Iqbal, A., Gunn, L.J., Abbott, D.: Functions of multivector variables. PloS One 10(3), e0116943 (2015)CrossRef
8.
go back to reference Cooper, P.: Data, information, knowledge and wisdom. Anaesth. Intensive Care Med. 15(1), 44–45 (2014)CrossRef Cooper, P.: Data, information, knowledge and wisdom. Anaesth. Intensive Care Med. 15(1), 44–45 (2014)CrossRef
9.
go back to reference Dorst, L., Fontijne, D., Mann, S.: Geometric Algebra for Computer Science: An Object-Oriented Approach to Geometry. Elsevier, Amsterdam (2010)MATH Dorst, L., Fontijne, D., Mann, S.: Geometric Algebra for Computer Science: An Object-Oriented Approach to Geometry. Elsevier, Amsterdam (2010)MATH
10.
go back to reference Gebken, C., Perwass, C., Sommer, G.: Parameter estimation from uncertain data in geometric algebra. Adv. Appl. Clifford Algebras 18(3–4), 647–664 (2008)MathSciNetCrossRef Gebken, C., Perwass, C., Sommer, G.: Parameter estimation from uncertain data in geometric algebra. Adv. Appl. Clifford Algebras 18(3–4), 647–664 (2008)MathSciNetCrossRef
11.
go back to reference Hildenbrand, D.: Foundations of geometric algebra computing. In: AIP Conference Proceedings, vol. 1479, no. 1, pp. 27–30. American Institute of Physics (2012) Hildenbrand, D.: Foundations of geometric algebra computing. In: AIP Conference Proceedings, vol. 1479, no. 1, pp. 27–30. American Institute of Physics (2012)
15.
go back to reference Janovská, D., Opfer, G.: Linear equations in quaternionic variables. Mitt. Math. Ges. Hamburg 27, 223–234 (2008)MathSciNetMATH Janovská, D., Opfer, G.: Linear equations in quaternionic variables. Mitt. Math. Ges. Hamburg 27, 223–234 (2008)MathSciNetMATH
16.
go back to reference Jianhong, Z., Hua, C.: Secuirty storage in the cloud computing: a RSA-based assumption data integrity check without original data. In: 2010 International Conference on Educational and Information Technology, vol. 2, pp. V2–143. IEEE (2010) Jianhong, Z., Hua, C.: Secuirty storage in the cloud computing: a RSA-based assumption data integrity check without original data. In: 2010 International Conference on Educational and Information Technology, vol. 2, pp. V2–143. IEEE (2010)
17.
go back to reference Johnson, H.J., Chow, S.T., Gu, Y.X.: Tamper resistant software-mass data encoding. US Patent 7,350,085, 25 March 2008 Johnson, H.J., Chow, S.T., Gu, Y.X.: Tamper resistant software-mass data encoding. US Patent 7,350,085, 25 March 2008
19.
go back to reference Kwok, Z.S.: Encryption integrity check with CRC encryption in memory using a word count-and address-derived nonce. US Patent 9,697,140, 4 July 2017 Kwok, Z.S.: Encryption integrity check with CRC encryption in memory using a word count-and address-derived nonce. US Patent 9,697,140, 4 July 2017
21.
go back to reference Majumdar, A.: Weighted subsymbolic data encoding. US Patent 10,120,933, 6 November 2018 Majumdar, A.: Weighted subsymbolic data encoding. US Patent 10,120,933, 6 November 2018
22.
go back to reference Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)CrossRef Ni, Z., Shi, Y.Q., Ansari, N., Su, W.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)CrossRef
26.
go back to reference Rockwood, A., Li, H., Hestenes, D.: System for encoding and manipulating models of objects. US Patent 6,853,964, 8 February 2005 Rockwood, A., Li, H., Hestenes, D.: System for encoding and manipulating models of objects. US Patent 6,853,964, 8 February 2005
28.
go back to reference Shen, S.T., Lin, H.Y., Tzeng, W.G.: An effective integrity check scheme for secure erasure code-based storage systems. IEEE Trans. Reliab. 64(3), 840–851 (2015)CrossRef Shen, S.T., Lin, H.Y., Tzeng, W.G.: An effective integrity check scheme for secure erasure code-based storage systems. IEEE Trans. Reliab. 64(3), 840–851 (2015)CrossRef
29.
go back to reference da Silva, D.W., de Araujo, C.P., Chow, E.: Fully homomorphic key update and key exchange over exterior product spaces for cloud computing applications. In: 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC), pp. 25–251. IEEE (2019) da Silva, D.W., de Araujo, C.P., Chow, E.: Fully homomorphic key update and key exchange over exterior product spaces for cloud computing applications. In: 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC), pp. 25–251. IEEE (2019)
30.
go back to reference da Silva, D.W., de Araujo, C.P., Chow, E., Barillas, B.S.: A new approach towards fully homomorphic encryption over geometric algebra. In: 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), pp. 0241–0249. IEEE (2019) da Silva, D.W., de Araujo, C.P., Chow, E., Barillas, B.S.: A new approach towards fully homomorphic encryption over geometric algebra. In: 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), pp. 0241–0249. IEEE (2019)
31.
go back to reference da Silva, D.W.H.A., de Oliveira, H.B.M., Chow, E., Barillas, B.S., de Araujo, C.P.: Homomorphic image processing over geometric product spaces and finite p-adic arithmetic. In: 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp. 27–36. IEEE (2019) da Silva, D.W.H.A., de Oliveira, H.B.M., Chow, E., Barillas, B.S., de Araujo, C.P.: Homomorphic image processing over geometric product spaces and finite p-adic arithmetic. In: 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp. 27–36. IEEE (2019)
36.
go back to reference Yule, H.P.: Data convolution and peak location, peak area, and peak energy measurements in scintillation counting. Anal. Chem. 38(1), 103–105 (1966)CrossRef Yule, H.P.: Data convolution and peak location, peak area, and peak energy measurements in scintillation counting. Anal. Chem. 38(1), 103–105 (1966)CrossRef
Metadata
Title
Homomorphic Data Concealment Powered by Clifford Geometric Algebra
Authors
David W. H. A. da Silva
Marcelo A. Xavier
Philip N. Brown
Edward Chow
Carlos Paz de Araujo
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-61864-3_44

Premium Partner