{"title":"Towards Practical Homomorphic Encryption in Cloud Computing","authors":"Adil Bouti, J. Keller","doi":"10.1109/NCCA.2015.20","DOIUrl":null,"url":null,"abstract":"Secure computing in clouds faces many challenges related to data confidentiality and integrity. Classical security models focus on securing data from outside attacks, e.g. from other cloud users. Yet, breach of data confidentiality by the cloud provider has received far less attention. In previous work, we presented a protocol to delegate computations into clouds, providing security against other cloud users and cloud providers through encrypted data. The protocol is based on homomorphic properties of encryption algorithms. However,that protocol was only practical in certain circumstances. In the present paper we introduce some practical extensions to our algorithm to improve its efficiency. Additionally we extend the algorithm to support multiparty computation while preserving its homomorphic properties. We then show how these optimization blocks can be used for applying the scheme to efficient face recognition using Eigenface recognition algorithm.","PeriodicalId":309782,"journal":{"name":"2015 IEEE Fourth Symposium on Network Cloud Computing and Applications (NCCA)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE Fourth Symposium on Network Cloud Computing and Applications (NCCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCCA.2015.20","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
Abstract
Secure computing in clouds faces many challenges related to data confidentiality and integrity. Classical security models focus on securing data from outside attacks, e.g. from other cloud users. Yet, breach of data confidentiality by the cloud provider has received far less attention. In previous work, we presented a protocol to delegate computations into clouds, providing security against other cloud users and cloud providers through encrypted data. The protocol is based on homomorphic properties of encryption algorithms. However,that protocol was only practical in certain circumstances. In the present paper we introduce some practical extensions to our algorithm to improve its efficiency. Additionally we extend the algorithm to support multiparty computation while preserving its homomorphic properties. We then show how these optimization blocks can be used for applying the scheme to efficient face recognition using Eigenface recognition algorithm.