Abstract
In this paper, we present several methods of secure outsourcing of numerical and scientific computations. Current outsourcing techniques are inspired by the numerous problems in computational mathematics, where a solution is obtained in the form of an approximation. Examples of such problems can be found in the fields of economics, military, petroleum industry, and in other areas. Many of today’s scientific and numerical problems require large computational resources; therefore, they can only be solved on supercomputers or by using the capabilities of the largest computing systems, such as grid technology, cloud, etc. We believe that it is imperative to improve the mathematical framework to enable secure outsourcing. Therefore, the main goal of this paper is to present different methods of finding approximate solutions to some equations solved by an external computer. To accomplish this, we chose certain classes of algebraic and differential equations because, in most cases, modern computing problems are reduced to solving such systems of equations (differential equations, linear programming, etc.). As an important application example we are presenting a specific applied problem related to geological exploration.
Similar content being viewed by others
References
Atallah M, Frikken K (2010) Securely outsourcing linear algebra computations. In: Proc of ASIACCS, pp 48–59
Mell P, Grance T (2010) Draft NIST working definition of cloud computing. Referenced on Jan 23rd, 2010. Online at http://csrc.nist.gov/groups/SNS/cloud-computing/index.html
Gentry C (2010) Computing arbitrary functions of encrypted data. Commun ACM 53(3):97–105
Gennaro R, Gentry C, Parno B (2010) Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Proc of CRYPTO’10, Aug 2010
Wang C, Cao N, Li J, Ren K, Lou W (2010) Secure ranked keyword search over encrypted cloud data. In: Proc of ICDCS’10
Wang C, Ren K, Wang J (2011) Secure and practical outsourcing of linear programming in cloud computing. In: INFOCOM, 2011 proceedings IEEE, pp 820–828
Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained access control in cloud computing. In: Proc of IEEE INFOCOM’10, San Diego, CA, USA, March 2010
Sun Microsystems, Inc. (2009) Building customer trust in cloud computing with transparent security. Online at https://www.sun.com/offers/details/sun_transparency.xml
Benjamin D, Atallah MJ (2008) Private and cheating-free outsourcing of algebraic computations. In: Proc of 6th conf on privacy, security, and trust (PST), pp 240–245
Akimanaa R, Markowitch O, Roggeman Y (2007) Grids confidential outsourcing of string matching. In: The 6th WSEAS int conf on software engineering, parallel and distributed systems
Atallah MJ, Li J (2005) Secure outsourcing of sequence comparisons. Int J Inf Secur 4(4):277–287
Hohenberger S, Lysyanskaya A (2005) How to securely outsource cryptographic computations. In: Proc of TCC, pp 264–282
Du W, Jia J, Mangal M, Murugesan M (2004) Uncheatable grid computing. In: Proc of ICDCS, pp 4–11
Atallah MJ, Pantazopoulos KN, Rice JR, Spafford EH (2001) Secure outsourcing of scientific computations. Adv Comput 54:216–272
Sun Microsystems, Inc. (2009) Building customer trust in cloud computing with transparent security. Online at https://www.sun.com/offers/details/sun_transparency.xml
Matsumoto T, Kato K, Imai H (1990) Speeding up secret computations with insecure auxiliary devices. In: Proceedings on advances in Cryptology—Crypto’88. LNCS, vol 403. Springer, Berlin, pp 497–506
Hong SM, Shin JB, Lee-Kwang H, Yoon H (1998) A new approach to server-aided secret computation. In: Proceedings of ICISC’98, Seoul, Korea, December 1998, pp 33–45
Cao T, Mao X, Lin D (2006) Security analysis of a server-aided RSA key generation protocol. In: Chen K, Deng RH, Lai X, Zhou J (eds) ISPEC. Lecture notes in computer science, vol 3903. Springer, Berlin, pp 314–320
Pfitzmann P, Waidner M (1993) Attacks on protocols for server-aided RSA computation. In: Rueppel R (ed) Advances in cryptology—Eurocrypt’92. LNCS, vol 658. Springer, Berlin, pp 153–162
Ernvall A, Nyberg K (2003) On server-aided computation for RSA protocols with private key splitting. In: Knapskog S (ed) Proceedings of Nordsec, Department of Telematics, NTNU
Beguin P, Quisquater JJ (1995) Fast server-aided RSA signatures secure against active attacks. In: Crypto’95, pp 57–69
Lim CH, Lee PJ (1995) Security and performance of server-aided RSA computation protocols. In: Crypto’95, pp 70–83
Burns J, Mitchell CJ (1994) Parameter selection for server-aided RSA computation schemes. IEEE Trans Comput 43(2):163–174
Boneh D, Modadugu N, Kim M (2000) Generating rsa keys on a handheld using an untrusted server. In: INDOCRYPT’00: proceedings of the first international conference on progress in cryptology. Springer, London, pp 271–282
Burns J, Mitchell CJ (1994) Parameter selection for server-aided rsa computation schemes. IEEE Trans Comput 43(2):163–174
Kawamura S, Shimbo A (1993) Fast server-aided secret computation protocols for modular exponentiation. IEEE J Sel Areas Commun 11(5):778–784
Seitkulov YN (2011) Methods of speeding up secret computations with insecure auxiliary computer. In: Proceedings of the 2011 international conference on security and management, Las Vegas, NV, USA, vol II, pp 409–412
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Seitkulov, Y.N. New methods of secure outsourcing of scientific computations. J Supercomput 65, 469–482 (2013). https://doi.org/10.1007/s11227-012-0809-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-012-0809-3