Computation on Randomized Data

Computation on Randomized Data

ID:41186014

大小:96.83 KB

页数:6页

时间:2019-08-18

Computation on Randomized Data_第1页
Computation on Randomized Data_第2页
Computation on Randomized Data_第3页
Computation on Randomized Data_第4页
Computation on Randomized Data_第5页
资源描述:

《Computation on Randomized Data》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库

1、ComputationonRandomizedDataFlorianKerschbaumSAPResearchKarlsruhe,Germanyflorian.kerschbaum@sap.comAbstractCryptographictools,suchassecurecomputationorhomomorphicencryption,areverycomputation-allyexpensive.Thismakestheiruseforconfidentialityprotectionofclient’sdataagainstanuntrustedserviceprovider

2、uneconomicalinmostapplicationsofcloudcomputing.Inthispaperwepresenttech-niquesforrandomizingdatausinglight-weightoperationsandthensecurelyoutsourcingthecomputationtoaserver.Wediscusshowtoformallyassessthesecurityofourapproachandpresentlinearprogram-mingasacasestudy.1IntroductionWhitDiffieiscommonl

3、yquotedwith“cryptographywillnotbethesolutionforsecurityofcloudcomputing”duetoeconomicreasons[9].Cryptographictools,suchassecurecomputation[6,11,23]orhomomorphicencryption[10,17]arecomputationallyexpensive.Recentresults[5,12,14,18]indicatethatwhiletheyarefeasibleforsmallcomputationstheyareorderso

4、fmagnitudeslowerthannon-securecomputations.Thegeneralargumentisthenthatnon-secure,localcomputation–evenoncomputationalweakdevicessuchasmobilephones–ismoreeconomicalthancryptographicallyprotectedcloudcomputing.Inthispaperwepresentanalternativeapproachbasedonrandomizationofinputdata.Theclientscomp

5、utealightweightfunctiony=f(x,r)ontheirinputxusingrandomcointossesr.Theoutputyissenttothecloudserviceproviderwhocomputes–theusuallyunmodified–functionz=g(y)andreturnsittotheclient.Theclientthende-randomizesusingthefunctionf′(z,r).Theideaisthatforcorrectnessf′(g(f(x,r)),r)=g(x)Twoperformanceobjecti

6、vesshouldbeobserved.First,thefunctionfshouldbeeasytocompute.Weproposeasadesignprincipletoonlyuselightweightrandomizationoperations.Forscalardataonlythefollowingoperationsshouldbeused:•additionofrandomnumbers•multiplicationwithrandomnumbersForvectordataonlythefollowingoperationsshouldbeused:•perm

7、utation•creationofnewelements•splittingofelementsAlltheseoperationscanbeperformedmuchfasteroncurrenthardwarethanoperationscommonlyusedincryptographicprotection,suchasmodularexponentiation.Thesecondperformanceobjectiveisthatc

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。