8 June 2012 Secure data sharing in public cloud
Author Affiliations +
Proceedings Volume 8334, Fourth International Conference on Digital Image Processing (ICDIP 2012); 83342Y (2012) https://doi.org/10.1117/12.956463
Event: Fourth International Conference on Digital Image Processing (ICDIP 2012), 2012, Kuala Lumpur, Malaysia
Abstract
Secure multi-party protocols have been proposed for entities (organizations or individuals) that don't fully trust each other to share sensitive information. Many types of entities need to collect, analyze, and disseminate data rapidly and accurately, without exposing sensitive information to unauthorized or untrusted parties. Solutions based on secure multiparty computation guarantee privacy and correctness, at an extra communication (too costly in communication to be practical) and computation cost. The high overhead motivates us to extend this SMC to cloud environment which provides large computation and communication capacity which makes SMC to be used between multiple clouds (i.e., it may between private or public or hybrid clouds).Cloud may encompass many high capacity servers which acts as a hosts which participate in computation (IaaS and PaaS) for final result, which is controlled by Cloud Trusted Authority (CTA) for secret sharing within the cloud. The communication between two clouds is controlled by High Level Trusted Authority (HLTA) which is one of the hosts in a cloud which provides MgaaS (Management as a Service). Due to high risk for security in clouds, HLTA generates and distributes public keys and private keys by using Carmichael-R-Prime- RSA algorithm for exchange of private data in SMC between itself and clouds. In cloud, CTA creates Group key for Secure communication between the hosts in cloud based on keys sent by HLTA for exchange of Intermediate values and shares for computation of final result. Since this scheme is extended to be used in clouds( due to high availability and scalability to increase computation power) it is possible to implement SMC practically for privacy preserving in data mining at low cost for the clients.
© (2012) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Kanaparti Venkataramana, Kanaparti Venkataramana, Naveen Kumar R., Naveen Kumar R., Sandhya Tatekalva, Sandhya Tatekalva, Padmavathamma M., Padmavathamma M., } "Secure data sharing in public cloud", Proc. SPIE 8334, Fourth International Conference on Digital Image Processing (ICDIP 2012), 83342Y (8 June 2012); doi: 10.1117/12.956463; https://doi.org/10.1117/12.956463
PROCEEDINGS
5 PAGES


SHARE
RELATED CONTENT


Back to Top