Secure computation outsourcing

نویسنده

  • Moez Ben MBarka
چکیده

Computation outsourcing is used when an entity needs to execute a task but does not have the appropriate computation power to perform it. In this paper, we will survey the approach of delegation: instead of doing the computation locally, the entity outsources it to one or more external helpers which have the appropriate resources. Although this can safely be done for most everyday life tasks, it is a more complicated question when dealing with computations which involve security requirements. Indeed, the entity owner may wish that the computation input to be kept secret from the helper. Furthermore, the involved helpers may be dishonest or corrupted and thus the task owner have to check that the returned result is correct. We will first survey some research works related to secure computation outsourcing. Then we will show some outsourcing models and related issues.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Separating indexes from data: a distributed scheme for secure database outsourcing

Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...

متن کامل

Outsourcing Secure Two-Party Computation as a Black Box

Secure multiparty computation (SMC) offers a technique to preserve functionality and data privacy in mobile applications. Current protocols that make this costly cryptographic construction feasible on mobile devices securely outsource the bulk of the computation to a cloud provider. However, these outsourcing techniques are built on specific secure computation assumptions and tools, and applyin...

متن کامل

Outsourcing Secure Two-Party Computation as a Black Box

Secure multiparty computation (SMC) offers a technique to preserve functionality and data privacy in mobile applications. Current protocols that make this costly cryptographic construction feasible on mobile devices securely outsource the bulk of the computation to a cloud provider. However, these outsourcing techniques are built on specific secure computation assumptions and tools, and applyin...

متن کامل

New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear Pairings

Outsourcing paradigm has become a hot research topic in the cryptography community, where computation workloads can be outsourced to cloud servers by the resource-constrained devices, such as RFID tags. The computation of bilinear pairings is the most expensive operation in pairing-based cryptographic primitives. In this paper, we present two new algorithms for secure outsourcing the computatio...

متن کامل

Secure Computation on Floating Point Numbers

Secure computation undeniably received a lot of attention in the recent years, with the shift toward cloud computing offering a new incentive for secure computation and outsourcing. Surprisingly little attention, however, has been paid to computation with non-integer data types. To narrow this gap, in this work we develop efficient solutions for computation with real numbers in floating point r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009