Abstract
To prevent leakage and misuse of data stored in the cloud, a secure computation method that can calculate encrypted data has been studied. Though early secure computations were not practical due to large computation times, secure multiparty computations having smaller computation times have been proposed in recent years. However, in the basic secure multiparty computation in which addition and subtraction, or multiplication and division coexist, cloud servers must return the intermediate result to the client once. Therefore, clients’ communication and computation costs become large. Moreover, the application of relatively complex calculations had not been sufficiently examined. In this paper, we introduce a mechanism to exchange the intermediate result between servers securely and to return only the final result to the client. Also, we apply the lightweight secure multi-party computation to a Fourier transformation, a range search, and detection of data outliers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
ANSI X9.31-1: American National Standard, Public-Key Cryptography Using Reversible Algorithms for the Financial Services Industry (1993)
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory IT-31(4), 469–472 (1985)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: EUROCRYPT 1999, pp. 223–238 (1999)
Gentry, C.: Homomorphic encryption using ideal lattices. In: STOC 2009, pp. 169–178 (2009)
Chida, K., et al.: A lightweight three-party secure function evaluation with error detection and its experimental result. IPSJ J. 52(9), 2674–2685 (2011). (in Japanese)
Miyanishi, Y., et al: New methods to ensure security to increase user’s sense of safety in cloud services. In: Ubiquitous Intelligence and Computing, Autonomic and Trusted Computing, and Scalable Computing and Communications and Its Associated Workshops (UTC-ATC-ScalCom 2014) (2014)
Grubbs, F.E.: Sample criteria for testing outlying observations. Ann. Math. Stat. 21(1), 27–58 (1950)
Acknowledgements
Part of this work was supported by JSPS KAKENHI Grant Number 16H02813 and was carried out under the Cooperative Research Project Program of the Research Institute of Electrical Communication, Tohoku University.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Takahashi, K., Sato, F. (2019). Securing of Clouds Based on Lightweight Secure Multi-party Computation. In: Barolli, L., Javaid, N., Ikeda, M., Takizawa, M. (eds) Complex, Intelligent, and Software Intensive Systems. CISIS 2018. Advances in Intelligent Systems and Computing, vol 772. Springer, Cham. https://doi.org/10.1007/978-3-319-93659-8_40
Download citation
DOI: https://doi.org/10.1007/978-3-319-93659-8_40
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-93658-1
Online ISBN: 978-3-319-93659-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)