Skip to main content
Log in

New methods of secure outsourcing of scientific computations

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

In this paper, we present several methods of secure outsourcing of numerical and scientific computations. Current outsourcing techniques are inspired by the numerous problems in computational mathematics, where a solution is obtained in the form of an approximation. Examples of such problems can be found in the fields of economics, military, petroleum industry, and in other areas. Many of today’s scientific and numerical problems require large computational resources; therefore, they can only be solved on supercomputers or by using the capabilities of the largest computing systems, such as grid technology, cloud, etc. We believe that it is imperative to improve the mathematical framework to enable secure outsourcing. Therefore, the main goal of this paper is to present different methods of finding approximate solutions to some equations solved by an external computer. To accomplish this, we chose certain classes of algebraic and differential equations because, in most cases, modern computing problems are reduced to solving such systems of equations (differential equations, linear programming, etc.). As an important application example we are presenting a specific applied problem related to geological exploration.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Atallah M, Frikken K (2010) Securely outsourcing linear algebra computations. In: Proc of ASIACCS, pp 48–59

    Google Scholar 

  2. Mell P, Grance T (2010) Draft NIST working definition of cloud computing. Referenced on Jan 23rd, 2010. Online at http://csrc.nist.gov/groups/SNS/cloud-computing/index.html

  3. Gentry C (2010) Computing arbitrary functions of encrypted data. Commun ACM 53(3):97–105

    Article  Google Scholar 

  4. Gennaro R, Gentry C, Parno B (2010) Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Proc of CRYPTO’10, Aug 2010

    Google Scholar 

  5. Wang C, Cao N, Li J, Ren K, Lou W (2010) Secure ranked keyword search over encrypted cloud data. In: Proc of ICDCS’10

    Google Scholar 

  6. Wang C, Ren K, Wang J (2011) Secure and practical outsourcing of linear programming in cloud computing. In: INFOCOM, 2011 proceedings IEEE, pp 820–828

  7. Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained access control in cloud computing. In: Proc of IEEE INFOCOM’10, San Diego, CA, USA, March 2010

    Google Scholar 

  8. Sun Microsystems, Inc. (2009) Building customer trust in cloud computing with transparent security. Online at https://www.sun.com/offers/details/sun_transparency.xml

  9. Benjamin D, Atallah MJ (2008) Private and cheating-free outsourcing of algebraic computations. In: Proc of 6th conf on privacy, security, and trust (PST), pp 240–245

    Google Scholar 

  10. Akimanaa R, Markowitch O, Roggeman Y (2007) Grids confidential outsourcing of string matching. In: The 6th WSEAS int conf on software engineering, parallel and distributed systems

    Google Scholar 

  11. Atallah MJ, Li J (2005) Secure outsourcing of sequence comparisons. Int J Inf Secur 4(4):277–287

    Article  Google Scholar 

  12. Hohenberger S, Lysyanskaya A (2005) How to securely outsource cryptographic computations. In: Proc of TCC, pp 264–282

    Google Scholar 

  13. Du W, Jia J, Mangal M, Murugesan M (2004) Uncheatable grid computing. In: Proc of ICDCS, pp 4–11

    Google Scholar 

  14. Atallah MJ, Pantazopoulos KN, Rice JR, Spafford EH (2001) Secure outsourcing of scientific computations. Adv Comput 54:216–272

    Google Scholar 

  15. Sun Microsystems, Inc. (2009) Building customer trust in cloud computing with transparent security. Online at https://www.sun.com/offers/details/sun_transparency.xml

  16. Matsumoto T, Kato K, Imai H (1990) Speeding up secret computations with insecure auxiliary devices. In: Proceedings on advances in Cryptology—Crypto’88. LNCS, vol 403. Springer, Berlin, pp 497–506

    Google Scholar 

  17. Hong SM, Shin JB, Lee-Kwang H, Yoon H (1998) A new approach to server-aided secret computation. In: Proceedings of ICISC’98, Seoul, Korea, December 1998, pp 33–45

    Google Scholar 

  18. Cao T, Mao X, Lin D (2006) Security analysis of a server-aided RSA key generation protocol. In: Chen K, Deng RH, Lai X, Zhou J (eds) ISPEC. Lecture notes in computer science, vol 3903. Springer, Berlin, pp 314–320

    Google Scholar 

  19. Pfitzmann P, Waidner M (1993) Attacks on protocols for server-aided RSA computation. In: Rueppel R (ed) Advances in cryptology—Eurocrypt’92. LNCS, vol 658. Springer, Berlin, pp 153–162

    Google Scholar 

  20. Ernvall A, Nyberg K (2003) On server-aided computation for RSA protocols with private key splitting. In: Knapskog S (ed) Proceedings of Nordsec, Department of Telematics, NTNU

    Google Scholar 

  21. Beguin P, Quisquater JJ (1995) Fast server-aided RSA signatures secure against active attacks. In: Crypto’95, pp 57–69

    Google Scholar 

  22. Lim CH, Lee PJ (1995) Security and performance of server-aided RSA computation protocols. In: Crypto’95, pp 70–83

    Google Scholar 

  23. Burns J, Mitchell CJ (1994) Parameter selection for server-aided RSA computation schemes. IEEE Trans Comput 43(2):163–174

    Article  Google Scholar 

  24. Boneh D, Modadugu N, Kim M (2000) Generating rsa keys on a handheld using an untrusted server. In: INDOCRYPT’00: proceedings of the first international conference on progress in cryptology. Springer, London, pp 271–282

    Google Scholar 

  25. Burns J, Mitchell CJ (1994) Parameter selection for server-aided rsa computation schemes. IEEE Trans Comput 43(2):163–174

    Article  Google Scholar 

  26. Kawamura S, Shimbo A (1993) Fast server-aided secret computation protocols for modular exponentiation. IEEE J Sel Areas Commun 11(5):778–784

    Article  Google Scholar 

  27. Seitkulov YN (2011) Methods of speeding up secret computations with insecure auxiliary computer. In: Proceedings of the 2011 international conference on security and management, Las Vegas, NV, USA, vol II, pp 409–412

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yerzhan N. Seitkulov.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Seitkulov, Y.N. New methods of secure outsourcing of scientific computations. J Supercomput 65, 469–482 (2013). https://doi.org/10.1007/s11227-012-0809-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-012-0809-3

Keywords

Navigation