{"title":"使用隐式安全性的隐私保护计算","authors":"Abhishek Parakh, W. Mahoney","doi":"10.1109/ICCCN.2013.6614172","DOIUrl":null,"url":null,"abstract":"We present a new technique for privacy preserving computation using an implicit security model that has applications in cloud computing. In the proposed technique, data is divided into partitions and stored over independent cloud servers. When the user wishes to perform computations on the data, he sends a signal to the servers and the servers perform the required computations. We show that if the main data storage servers do not collude, the privacy of the user data is maintained. This can be guaranteed by the use of independent cloud providers. The proposed technique eliminates the requirement of key management, is efficient and practical.","PeriodicalId":207337,"journal":{"name":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Privacy Preserving Computations Using Implicit Security\",\"authors\":\"Abhishek Parakh, W. Mahoney\",\"doi\":\"10.1109/ICCCN.2013.6614172\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We present a new technique for privacy preserving computation using an implicit security model that has applications in cloud computing. In the proposed technique, data is divided into partitions and stored over independent cloud servers. When the user wishes to perform computations on the data, he sends a signal to the servers and the servers perform the required computations. We show that if the main data storage servers do not collude, the privacy of the user data is maintained. This can be guaranteed by the use of independent cloud providers. The proposed technique eliminates the requirement of key management, is efficient and practical.\",\"PeriodicalId\":207337,\"journal\":{\"name\":\"2013 22nd International Conference on Computer Communication and Networks (ICCCN)\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-10-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 22nd International Conference on Computer Communication and Networks (ICCCN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCN.2013.6614172\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 22nd International Conference on Computer Communication and Networks (ICCCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCN.2013.6614172","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Privacy Preserving Computations Using Implicit Security
We present a new technique for privacy preserving computation using an implicit security model that has applications in cloud computing. In the proposed technique, data is divided into partitions and stored over independent cloud servers. When the user wishes to perform computations on the data, he sends a signal to the servers and the servers perform the required computations. We show that if the main data storage servers do not collude, the privacy of the user data is maintained. This can be guaranteed by the use of independent cloud providers. The proposed technique eliminates the requirement of key management, is efficient and practical.