BazEkon - Biblioteka Główna Uniwersytetu Ekonomicznego w Krakowie

BazEkon home page

Meny główne

Autor
Chechulina Darya (Novosibirsk State University, Russia), Shatilov Kirill (Novosibirsk State University, Russia), Krendelev Sergey (Novosibirsk State University, Rusia)
Tytuł
Fully Homomorphic Encryption for Secure Computations in Protected Database
Źródło
Annals of Computer Science and Information Systems, 2015, vol. 6, s. 125-131, bibliogr. 20 poz.
Słowa kluczowe
Chmura obliczeniowa
Cloud computing
Uwagi
summ.
Abstrakt
Outsourced computations and, more particularly, cloud computations, are widespread nowadays. That is why the problem of keeping the data security arises. Multiple fully homomorphic cryptosystems were proposed in order to perform secret computations in untrusted environments. But most of the existent solutions are practically inapplicable as they require huge computation resources and produce big (∼1Gb) keys and ciphertexts. Therefore, we propose the undemanding fully homomorphic scheme with practically acceptable (∼few Kb) keys and output data. Our solution uses modular arithmetic in order to avoid the increase in data size. We have validated our approach through the implementation of the proposed cryptosystem. The details of used algorithms and the results of security evaluation are covered in this paper.(original abstract)
Pełny tekst
Pokaż
Bibliografia
Pokaż
  1. C. Gentry, "A fully homomorphic encryption scheme," [Online]. Available: http://crypto.stanford.edu/craig/craig-thesis.pdf.
  2. C. Gentry and S. Halevi, "Implementing Gentry's Fully-Homomorphic Encryption Scheme," in Advances in Cryptology - EUROCRYPT 2011, pp. 129-148. DOI: 10.1007/978-3-642-20465-4_9. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-20465-4_9
  3. D. Knuth, The Art of Computer Programming Seminumerical Algorithms, vol. 2, Addison-Wesley Pub. Co., 1981.
  4. "Programming Computation on Encrypted Data," Broad Agency Announcement DARPA-BAA-10-81, Defense Advanced Research Projects Agency, 2010.
  5. R. Rivest, L. Adleman and M. Dertouzos, "On data banks and privacy homomorphisms," in Foundations of Secure Computation, 1978, pp. 169-180.
  6. D. Stehle and R. Steinfeld, "Faster Fully Homomorphic Encryption," on Asiacrypt conference, http://eprint.iacr.org/2010/299.pdf, 2010.
  7. "Cloud Computing Top Threats in 2013," The Notorious Nine, Cloud Security Alliance, [Online]. Available: https: //downloads.cloudsecurityalliance.org/initiatives/top_threats/The_ Notorious_Nine_Cloud_Computing_Top_Threats_in_2013.pdf.
  8. W. R. Claycomb and A. Nicoll, "Insider Threats to Cloud Computing: Directions for New Research Challenges," in Proceedings of the 2012 IEEE 36th Annual Computer Software and Applications Conference, 2012, pp. 387-394. DOI: 10.1109/COMPSAC.2012.113. [Online]. Available: http://dx.doi.org/10.1109/COMPSAC.2012.113
  9. "Chronology of data breaches," Privacy Rights Clearinghouse, [Online]. Available: http://www.privacyrights.org/data-breach.
  10. "Interview with Whistleblower Edward Snowden on Global Spying," Der Spiegel, 2013.
  11. J. Zhou, "On the security of cloud data storage and sharing," in Proceedings of the 2nd international workshop on Security in cloud computing, 2014, pp. 1-2. DOI: 10.1145/2600075.2600087. [Online]. Available: http://doi.acm.org/10.1145/2600075.2600087
  12. A. J. Feldman, W. P. Zeller, M. J. Freedman and E. W. Felten "SPORC: Group collaboration using untrusted cloud resources," in Proceedings of the 9th Symposium on Operating Systems Design and Implementation, Vancouver, Canada, 2010.
  13. "OpenSSL Heartbleed Vulnerability," Cyber Security Bulletins, Canada, 2014.
  14. S. Tu, M. F. Kaashoek, S. Madden and N. Zeldovich, "Processing Analytical Queries over Encrypted Data," in Proceedings of the 39th International Conference on Very Large Data Bases (VLDB), Trento, Italy, 2013, pp. 289-300. DOI: 10.14778/2535573.2488336. [Online]. Available: http://dx.doi.org/10.14778/2535573.2488336
  15. K. Shatilov, V. Boiko, S. Krendelev, D. Anisutina and A. Sumaneev, "Solution for Secure Private Data Storage in a Cloud," in Proceedings of the Federated Conference on Computer Science and Information Systems, 2014, pp. 885-889. DOI: 10.15439/2014F43. [Online]. Available: http://dx.doi.org/10.15439/2014F43
  16. M. Usoltseva, S. Krendelev and M. Yakovlev, "Order-preserving encryption schemes based on arithmetic coding and matrices," in Proceedings of the Federated Conference on Computer Science and Information Systems, 2014, pp. 891-899. DOI: 10.15439/2014F186. [Online]. Available: http://dx.doi.org/10.15439/2014F186
  17. M. Tehranipoor and F. Koushanfar, "A Survey of Hardware Trojan Taxonomy and Detection," in IEEE Des. Test, 2010, pp. 10- 25. DOI: 10.1109/MDT.2010.7. [Online]. Available: http://dx.doi.org/10. 1109/MDT.2010.7
  18. R. Lehtinen, D. Russell and G. T. Gantemi, "Computer Security Basics," O'Reilly, 2006.
  19. A. Shamir, "A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem," CRYPTO, 1982, pp. 279-288.
  20. L. S. Hill, "Cryptography in an Algebraic Alphabet," The American Mathematical Monthly, vol. 36, 1929, pp. 306-312.
Cytowane przez
Pokaż
ISSN
2300-5963
Język
eng
URI / DOI
http://dx.doi.org/10.15439/2015F140
Udostępnij na Facebooku Udostępnij na Twitterze Udostępnij na Google+ Udostępnij na Pinterest Udostępnij na LinkedIn Wyślij znajomemu