Skip to main content
Erschienen in: Cluster Computing 2/2016

01.06.2016

Secure outsourcing of modular exponentiations in cloud and cluster computing

verfasst von: Jun Ye, Zheng Xu, Yong Ding

Erschienen in: Cluster Computing | Ausgabe 2/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing and cluster computing are user-centric computing services. The shared software and hardware resources and information can be provided to the computers and other equipments according to the demands of users. A majority of services are deployed through outsourcing. Outsourcing computation allows resource-constrained clients to outsource their complex computation workloads to a powerful server which is rich of computation resources. Modular exponentiation is one of the most complex computations in public key based cryptographic schemes. It is useful to reduce the computation cost of the clients by using outsourcing computation. In this paper, we propose a novel outsourcing algorithm for modular exponentiation based on the new mathematical division under the setting of two non-colluding cloud servers. The base and the power of the outsourced data can be kept private and the efficiency is improved compared with former works.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
2.
Zurück zum Zitat Atallah, M.J., Frikken, K.B.: Securely outsourcing linear algebra computations. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 48–59. Springer-Verlag, , New York (2010) Atallah, M.J., Frikken, K.B.: Securely outsourcing linear algebra computations. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 48–59. Springer-Verlag, , New York (2010)
3.
Zurück zum Zitat Atallah, M.J., Pantazopoulos, K.N., Rice, J.R., Spafford, E.H.: Secure outsourcing of scientific computations. Adv. Comput. 54, 215–272 (2002)CrossRef Atallah, M.J., Pantazopoulos, K.N., Rice, J.R., Spafford, E.H.: Secure outsourcing of scientific computations. Adv. Comput. 54, 215–272 (2002)CrossRef
4.
Zurück zum Zitat Beaver, D., Feigenbaum, J.: Hiding instances in multioracle queries. In: Proceedings of 7th Annual Symposium on Theoretical Aspects of Computer Science (STACS 90), Rouen, France, 22–24 Feb, vol. 415, pp. 37–48. Springer-Verlag, New York (1990) Beaver, D., Feigenbaum, J.: Hiding instances in multioracle queries. In: Proceedings of 7th Annual Symposium on Theoretical Aspects of Computer Science (STACS 90), Rouen, France, 22–24 Feb, vol. 415, pp. 37–48. Springer-Verlag, New York (1990)
5.
Zurück zum Zitat Beaver, D., Feigenbaum, J., Kilian, J., Rogaway, P.: Locally random reductions: Improvements and applications. J. Cryptol. 10(1), 17–36 (1997)CrossRefMATHMathSciNet Beaver, D., Feigenbaum, J., Kilian, J., Rogaway, P.: Locally random reductions: Improvements and applications. J. Cryptol. 10(1), 17–36 (1997)CrossRefMATHMathSciNet
6.
Zurück zum Zitat Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable delegation of computation over large datasets. In: Advances in Cryptology–CRYPTO 2011, pp. 111–131. Springer, New York (2011) Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable delegation of computation over large datasets. In: Advances in Cryptology–CRYPTO 2011, pp. 111–131. Springer, New York (2011)
7.
Zurück zum Zitat Benjamin, D., Atallah, M.J.: Private and cheating-free outsourcing of algebraic computations. In: Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, PST, Washington, DC, pp. 483–501. Springer-Verlag, New York (2008) Benjamin, D., Atallah, M.J.: Private and cheating-free outsourcing of algebraic computations. In: Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, PST, Washington, DC, pp. 483–501. Springer-Verlag, New York (2008)
8.
Zurück zum Zitat Blum, M., Luby, M., Rubinfeld, R.: Program result checking against adaptive programs and in cryptographic settings. DIMACS Ser. Discrete Math. Theor. Comput. Sci. 2, 107–118 (1991)MATHMathSciNet Blum, M., Luby, M., Rubinfeld, R.: Program result checking against adaptive programs and in cryptographic settings. DIMACS Ser. Discrete Math. Theor. Comput. Sci. 2, 107–118 (1991)MATHMathSciNet
9.
Zurück zum Zitat Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Advances in Cryptology - CRYPTO ’92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, 16–20 Aug, 1992, pp. 89–105 (1992) Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Advances in Cryptology - CRYPTO ’92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, 16–20 Aug, 1992, pp. 89–105 (1992)
10.
Zurück zum Zitat Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. In: Proceedinfs of 17th European Symposium on Research in Computer Security, Pisa, Italy, vol. 7459, pp. 541–556. Springer-Verlag, New York (2012) Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. In: Proceedinfs of 17th European Symposium on Research in Computer Security, Pisa, Italy, vol. 7459, pp. 541–556. Springer-Verlag, New York (2012)
11.
Zurück zum Zitat Choi, S.G., Katz, J., Kumaresan, R., Cid, C.: Multi-client Non-interactive Verifiable Computation, vol. 7785, pp. 499–518. Springer-Verlag, London (2013)MATH Choi, S.G., Katz, J., Kumaresan, R., Cid, C.: Multi-client Non-interactive Verifiable Computation, vol. 7785, pp. 499–518. Springer-Verlag, London (2013)MATH
12.
Zurück zum Zitat Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In Proceedings of the 2012 ACM conference on Computer and communications security, pp. 501–512. ACM, New York (2012) Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In Proceedings of the 2012 ACM conference on Computer and communications security, pp. 501–512. ACM, New York (2012)
13.
Zurück zum Zitat Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Advances in Cryptology— CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, 15–19 Aug, 2010, pp. 465–482 (2010) Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Advances in Cryptology— CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, 15–19 Aug, 2010, pp. 465–482 (2010)
14.
Zurück zum Zitat M. Girault and D. Lefranc. Server-aided verification: Theory and practice. In Proc. of 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, volume 3788, pages 605–623. Springer-Verlag, December 2005 M. Girault and D. Lefranc. Server-aided verification: Theory and practice. In Proc. of 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, volume 3788, pages 605–623. Springer-Verlag, December 2005
15.
Zurück zum Zitat Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: TCC, 2005, LNCS, vol. 3378, pp. 264–282. Springer-Verlag, New York (2005) Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: TCC, 2005, LNCS, vol. 3378, pp. 264–282. Springer-Verlag, New York (2005)
16.
Zurück zum Zitat Hu, C., Xu, Z., Liuand, Y., Mei, L., Chen, L., Luo, X.: Semantic link network-based model for organizing multimedia big data. IEEE Trans. Emerg. Top. Comput. 2(3), 376–387 (2014)CrossRef Hu, C., Xu, Z., Liuand, Y., Mei, L., Chen, L., Luo, X.: Semantic link network-based model for organizing multimedia big data. IEEE Trans. Emerg. Top. Comput. 2(3), 376–387 (2014)CrossRef
17.
Zurück zum Zitat Jakobsson, M., Wetzel, S.: Secure server-aided signature generation. In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, 13–15, Feb, 2001, pp. 383–401 (2001) Jakobsson, M., Wetzel, S.: Secure server-aided signature generation. In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, 13–15, Feb, 2001, pp. 383–401 (2001)
18.
Zurück zum Zitat Li, J., Chen, X., Huang, Q., Wong, D.S.: Digital provenance: enabling secure data forensics in cloud computing. Future Gener. Comput. Syst. 37, 259–266 (2014)CrossRef Li, J., Chen, X., Huang, Q., Wong, D.S.: Digital provenance: enabling secure data forensics in cloud computing. Future Gener. Comput. Syst. 37, 259–266 (2014)CrossRef
19.
Zurück zum Zitat Li, J., Li, J., Chen, X., Liu, Z., Jia, C.: Privacy-preserving data utilization in hybrid clouds. Future Gener. Comput. Syst. 30, 98–106 (2014)CrossRef Li, J., Li, J., Chen, X., Liu, Z., Jia, C.: Privacy-preserving data utilization in hybrid clouds. Future Gener. Comput. Syst. 30, 98–106 (2014)CrossRef
20.
Zurück zum Zitat Nguyen, P.Q., Shparlinski, I.E., Stern, J.: Distribution of modular sums and the security of the server aided exponentiation. Cryptogr. Comput. Number Theory 20, 331–342 (2001)CrossRefMATHMathSciNet Nguyen, P.Q., Shparlinski, I.E., Stern, J.: Distribution of modular sums and the security of the server aided exponentiation. Cryptogr. Comput. Number Theory 20, 331–342 (2001)CrossRefMATHMathSciNet
21.
Zurück zum Zitat Parno, B., Howell, J., Gentry, C., Raykova, M.: Pinocchio: Nearly Practical Verifiable Computation, pp. 238–252. Springer-Verlag, Berlin (2013) Parno, B., Howell, J., Gentry, C., Raykova, M.: Pinocchio: Nearly Practical Verifiable Computation, pp. 238–252. Springer-Verlag, Berlin (2013)
22.
Zurück zum Zitat Rooij, P.: On schnorr’s preprocessing for digital signature schemes. J. Cryptol. 10(1), 1–16 (1997)CrossRefMATH Rooij, P.: On schnorr’s preprocessing for digital signature schemes. J. Cryptol. 10(1), 1–16 (1997)CrossRefMATH
23.
Zurück zum Zitat Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)CrossRef Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)CrossRef
24.
Zurück zum Zitat van Dijk, M., Clarke, D.E., Gassend, B., Suh, G.E., Devadas, S.: Speeding up exponentiation using an untrusted computational resource. Des. Codes Cryptogr. 39(2), 253–273 (2006)CrossRefMATHMathSciNet van Dijk, M., Clarke, D.E., Gassend, B., Suh, G.E., Devadas, S.: Speeding up exponentiation using an untrusted computational resource. Des. Codes Cryptogr. 39(2), 253–273 (2006)CrossRefMATHMathSciNet
25.
Zurück zum Zitat Wang, Y., Wu, Q., Wong, D.S., Qin, B., Chow, S.S. M., Liu, Z., Tan, X.: Securely outsourcing exponentiations with single untrusted program for cloud storage. In: Computer Security—ESORICS 2014—19th European Symposium on Research in Computer Security, Wroclaw, Poland, 7–11, Sept, 2014, pp. 326–343 (2014) Wang, Y., Wu, Q., Wong, D.S., Qin, B., Chow, S.S. M., Liu, Z., Tan, X.: Securely outsourcing exponentiations with single untrusted program for cloud storage. In: Computer Security—ESORICS 2014—19th European Symposium on Research in Computer Security, Wroclaw, Poland, 7–11, Sept, 2014, pp. 326–343 (2014)
26.
Zurück zum Zitat Wang, J.F., Ma, H., Tang, Q., Li, J., Zhu, H., Ma, S.Q., Chen, X.F.: Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10(2), 667–684 (2013)CrossRef Wang, J.F., Ma, H., Tang, Q., Li, J., Zhu, H., Ma, S.Q., Chen, X.F.: Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10(2), 667–684 (2013)CrossRef
27.
Zurück zum Zitat Wu, W., Mu, Y., Susilo, W., Huang, X.: Server-aided verification signatures: Definitions and new constructions. In: Proceedings of Second International Conference, ProvSec 2008, Shanghai, China, vol. 5324, pp. 141–155. Springer-Verlag, New York (2008) Wu, W., Mu, Y., Susilo, W., Huang, X.: Server-aided verification signatures: Definitions and new constructions. In: Proceedings of Second International Conference, ProvSec 2008, Shanghai, China, vol. 5324, pp. 141–155. Springer-Verlag, New York (2008)
28.
Zurück zum Zitat Xu, Z., Liu, Y., Yen, N., Mei, L., Luo, X., Wei, X., Hu, C.: Crowdsourcing based description of urban emergency events using social media big data. IEEE Trans. Cloud Comput. (2016). doi:10.1109/TCC.2016.2517638 Xu, Z., Liu, Y., Yen, N., Mei, L., Luo, X., Wei, X., Hu, C.: Crowdsourcing based description of urban emergency events using social media big data. IEEE Trans. Cloud Comput. (2016). doi:10.​1109/​TCC.​2016.​2517638
29.
Zurück zum Zitat Ye, J., Zhang, H., Fu, C.: Verifiable delegation of polynomials. Int. J. Netw. Secur. 18(2), 283–290 (2016) Ye, J., Zhang, H., Fu, C.: Verifiable delegation of polynomials. Int. J. Netw. Secur. 18(2), 283–290 (2016)
30.
Zurück zum Zitat Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)CrossRef Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583–592 (2012)CrossRef
Metadaten
Titel
Secure outsourcing of modular exponentiations in cloud and cluster computing
verfasst von
Jun Ye
Zheng Xu
Yong Ding
Publikationsdatum
01.06.2016
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 2/2016
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-016-0571-z

Weitere Artikel der Ausgabe 2/2016

Cluster Computing 2/2016 Zur Ausgabe