Skip to main content
Top
Published in: Cluster Computing 2/2016

01-06-2016

Secure outsourcing of modular exponentiations in cloud and cluster computing

Authors: Jun Ye, Zheng Xu, Yong Ding

Published in: Cluster Computing | Issue 2/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud computing and cluster computing are user-centric computing services. The shared software and hardware resources and information can be provided to the computers and other equipments according to the demands of users. A majority of services are deployed through outsourcing. Outsourcing computation allows resource-constrained clients to outsource their complex computation workloads to a powerful server which is rich of computation resources. Modular exponentiation is one of the most complex computations in public key based cryptographic schemes. It is useful to reduce the computation cost of the clients by using outsourcing computation. In this paper, we propose a novel outsourcing algorithm for modular exponentiation based on the new mathematical division under the setting of two non-colluding cloud servers. The base and the power of the outsourced data can be kept private and the efficiency is improved compared with former works.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Atallah, M.J., Frikken, K.B.: Securely outsourcing linear algebra computations. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 48–59. Springer-Verlag, , New York (2010) Atallah, M.J., Frikken, K.B.: Securely outsourcing linear algebra computations. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 48–59. Springer-Verlag, , New York (2010)
3.
go back to reference Atallah, M.J., Pantazopoulos, K.N., Rice, J.R., Spafford, E.H.: Secure outsourcing of scientific computations. Adv. Comput. 54, 215–272 (2002)CrossRef Atallah, M.J., Pantazopoulos, K.N., Rice, J.R., Spafford, E.H.: Secure outsourcing of scientific computations. Adv. Comput. 54, 215–272 (2002)CrossRef
4.
go back to reference Beaver, D., Feigenbaum, J.: Hiding instances in multioracle queries. In: Proceedings of 7th Annual Symposium on Theoretical Aspects of Computer Science (STACS 90), Rouen, France, 22–24 Feb, vol. 415, pp. 37–48. Springer-Verlag, New York (1990) Beaver, D., Feigenbaum, J.: Hiding instances in multioracle queries. In: Proceedings of 7th Annual Symposium on Theoretical Aspects of Computer Science (STACS 90), Rouen, France, 22–24 Feb, vol. 415, pp. 37–48. Springer-Verlag, New York (1990)
5.
go back to reference Beaver, D., Feigenbaum, J., Kilian, J., Rogaway, P.: Locally random reductions: Improvements and applications. J. Cryptol. 10(1), 17–36 (1997)CrossRefMATHMathSciNet Beaver, D., Feigenbaum, J., Kilian, J., Rogaway, P.: Locally random reductions: Improvements and applications. J. Cryptol. 10(1), 17–36 (1997)CrossRefMATHMathSciNet
6.
go back to reference Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable delegation of computation over large datasets. In: Advances in Cryptology–CRYPTO 2011, pp. 111–131. Springer, New York (2011) Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable delegation of computation over large datasets. In: Advances in Cryptology–CRYPTO 2011, pp. 111–131. Springer, New York (2011)
7.
go back to reference Benjamin, D., Atallah, M.J.: Private and cheating-free outsourcing of algebraic computations. In: Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, PST, Washington, DC, pp. 483–501. Springer-Verlag, New York (2008) Benjamin, D., Atallah, M.J.: Private and cheating-free outsourcing of algebraic computations. In: Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, PST, Washington, DC, pp. 483–501. Springer-Verlag, New York (2008)
8.
go back to reference Blum, M., Luby, M., Rubinfeld, R.: Program result checking against adaptive programs and in cryptographic settings. DIMACS Ser. Discrete Math. Theor. Comput. Sci. 2, 107–118 (1991)MATHMathSciNet Blum, M., Luby, M., Rubinfeld, R.: Program result checking against adaptive programs and in cryptographic settings. DIMACS Ser. Discrete Math. Theor. Comput. Sci. 2, 107–118 (1991)MATHMathSciNet
9.
go back to reference Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Advances in Cryptology - CRYPTO ’92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, 16–20 Aug, 1992, pp. 89–105 (1992) Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Advances in Cryptology - CRYPTO ’92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, 16–20 Aug, 1992, pp. 89–105 (1992)
10.
go back to reference Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. In: Proceedinfs of 17th European Symposium on Research in Computer Security, Pisa, Italy, vol. 7459, pp. 541–556. Springer-Verlag, New York (2012) Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. In: Proceedinfs of 17th European Symposium on Research in Computer Security, Pisa, Italy, vol. 7459, pp. 541–556. Springer-Verlag, New York (2012)
11.
go back to reference Choi, S.G., Katz, J., Kumaresan, R., Cid, C.: Multi-client Non-interactive Verifiable Computation, vol. 7785, pp. 499–518. Springer-Verlag, London (2013)MATH Choi, S.G., Katz, J., Kumaresan, R., Cid, C.: Multi-client Non-interactive Verifiable Computation, vol. 7785, pp. 499–518. Springer-Verlag, London (2013)MATH
12.
go back to reference Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In Proceedings of the 2012 ACM conference on Computer and communications security, pp. 501–512. ACM, New York (2012) Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In Proceedings of the 2012 ACM conference on Computer and communications security, pp. 501–512. ACM, New York (2012)
13.
go back to reference Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Advances in Cryptology— CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, 15–19 Aug, 2010, pp. 465–482 (2010) Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Advances in Cryptology— CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, 15–19 Aug, 2010, pp. 465–482 (2010)
14.
go back to reference M. Girault and D. Lefranc. Server-aided verification: Theory and practice. In Proc. of 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, volume 3788, pages 605–623. Springer-Verlag, December 2005 M. Girault and D. Lefranc. Server-aided verification: Theory and practice. In Proc. of 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, volume 3788, pages 605–623. Springer-Verlag, December 2005
15.
go back to reference Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: TCC, 2005, LNCS, vol. 3378, pp. 264–282. Springer-Verlag, New York (2005) Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: TCC, 2005, LNCS, vol. 3378, pp. 264–282. Springer-Verlag, New York (2005)
16.
go back to reference Hu, C., Xu, Z., Liuand, Y., Mei, L., Chen, L., Luo, X.: Semantic link network-based model for organizing multimedia big data. IEEE Trans. Emerg. Top. Comput. 2(3), 376–387 (2014)CrossRef Hu, C., Xu, Z., Liuand, Y., Mei, L., Chen, L., Luo, X.: Semantic link network-based model for organizing multimedia big data. IEEE Trans. Emerg. Top. Comput. 2(3), 376–387 (2014)CrossRef
17.
go back to reference Jakobsson, M., Wetzel, S.: Secure server-aided signature generation. In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, 13–15, Feb, 2001, pp. 383–401 (2001) Jakobsson, M., Wetzel, S.: Secure server-aided signature generation. In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, 13–15, Feb, 2001, pp. 383–401 (2001)
18.
go back to reference Li, J., Chen, X., Huang, Q., Wong, D.S.: Digital provenance: enabling secure data forensics in cloud computing. Future Gener. Comput. Syst. 37, 259–266 (2014)CrossRef Li, J., Chen, X., Huang, Q., Wong, D.S.: Digital provenance: enabling secure data forensics in cloud computing. Future Gener. Comput. Syst. 37, 259–266 (2014)CrossRef
19.
go back to reference Li, J., Li, J., Chen, X., Liu, Z., Jia, C.: Privacy-preserving data utilization in hybrid clouds. Future Gener. Comput. Syst. 30, 98–106 (2014)CrossRef Li, J., Li, J., Chen, X., Liu, Z., Jia, C.: Privacy-preserving data utilization in hybrid clouds. Future Gener. Comput. Syst. 30, 98–106 (2014)CrossRef
20.
go back to reference Nguyen, P.Q., Shparlinski, I.E., Stern, J.: Distribution of modular sums and the security of the server aided exponentiation. Cryptogr. Comput. Number Theory 20, 331–342 (2001)CrossRefMATHMathSciNet Nguyen, P.Q., Shparlinski, I.E., Stern, J.: Distribution of modular sums and the security of the server aided exponentiation. Cryptogr. Comput. Number Theory 20, 331–342 (2001)CrossRefMATHMathSciNet
21.
go back to reference Parno, B., Howell, J., Gentry, C., Raykova, M.: Pinocchio: Nearly Practical Verifiable Computation, pp. 238–252. Springer-Verlag, Berlin (2013) Parno, B., Howell, J., Gentry, C., Raykova, M.: Pinocchio: Nearly Practical Verifiable Computation, pp. 238–252. Springer-Verlag, Berlin (2013)
22.
go back to reference Rooij, P.: On schnorr’s preprocessing for digital signature schemes. J. Cryptol. 10(1), 1–16 (1997)CrossRefMATH Rooij, P.: On schnorr’s preprocessing for digital signature schemes. J. Cryptol. 10(1), 1–16 (1997)CrossRefMATH
23.
go back to reference Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)CrossRef Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)CrossRef
24.
go back to reference van Dijk, M., Clarke, D.E., Gassend, B., Suh, G.E., Devadas, S.: Speeding up exponentiation using an untrusted computational resource. Des. Codes Cryptogr. 39(2), 253–273 (2006)CrossRefMATHMathSciNet van Dijk, M., Clarke, D.E., Gassend, B., Suh, G.E., Devadas, S.: Speeding up exponentiation using an untrusted computational resource. Des. Codes Cryptogr. 39(2), 253–273 (2006)CrossRefMATHMathSciNet
25.
go back to reference Wang, Y., Wu, Q., Wong, D.S., Qin, B., Chow, S.S. M., Liu, Z., Tan, X.: Securely outsourcing exponentiations with single untrusted program for cloud storage. In: Computer Security—ESORICS 2014—19th European Symposium on Research in Computer Security, Wroclaw, Poland, 7–11, Sept, 2014, pp. 326–343 (2014) Wang, Y., Wu, Q., Wong, D.S., Qin, B., Chow, S.S. M., Liu, Z., Tan, X.: Securely outsourcing exponentiations with single untrusted program for cloud storage. In: Computer Security—ESORICS 2014—19th European Symposium on Research in Computer Security, Wroclaw, Poland, 7–11, Sept, 2014, pp. 326–343 (2014)
26.
go back to reference Wang, J.F., Ma, H., Tang, Q., Li, J., Zhu, H., Ma, S.Q., Chen, X.F.: Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10(2), 667–684 (2013)CrossRef Wang, J.F., Ma, H., Tang, Q., Li, J., Zhu, H., Ma, S.Q., Chen, X.F.: Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10(2), 667–684 (2013)CrossRef
27.
go back to reference Wu, W., Mu, Y., Susilo, W., Huang, X.: Server-aided verification signatures: Definitions and new constructions. In: Proceedings of Second International Conference, ProvSec 2008, Shanghai, China, vol. 5324, pp. 141–155. Springer-Verlag, New York (2008) Wu, W., Mu, Y., Susilo, W., Huang, X.: Server-aided verification signatures: Definitions and new constructions. In: Proceedings of Second International Conference, ProvSec 2008, Shanghai, China, vol. 5324, pp. 141–155. Springer-Verlag, New York (2008)
28.
go back to reference Xu, Z., Liu, Y., Yen, N., Mei, L., Luo, X., Wei, X., Hu, C.: Crowdsourcing based description of urban emergency events using social media big data. IEEE Trans. Cloud Comput. (2016). doi:10.1109/TCC.2016.2517638 Xu, Z., Liu, Y., Yen, N., Mei, L., Luo, X., Wei, X., Hu, C.: Crowdsourcing based description of urban emergency events using social media big data. IEEE Trans. Cloud Comput. (2016). doi:10.​1109/​TCC.​2016.​2517638
29.
go back to reference Ye, J., Zhang, H., Fu, C.: Verifiable delegation of polynomials. Int. J. Netw. Secur. 18(2), 283–290 (2016) Ye, J., Zhang, H., Fu, C.: Verifiable delegation of polynomials. Int. J. Netw. Secur. 18(2), 283–290 (2016)
30.
go back to reference Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)CrossRef Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)CrossRef
Metadata
Title
Secure outsourcing of modular exponentiations in cloud and cluster computing
Authors
Jun Ye
Zheng Xu
Yong Ding
Publication date
01-06-2016
Publisher
Springer US
Published in
Cluster Computing / Issue 2/2016
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-016-0571-z

Other articles of this Issue 2/2016

Cluster Computing 2/2016 Go to the issue

Premium Partner