IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Data Confidentiality and Integrity Preserving Outsourcing Algorithm for System of Linear Equation to a Malicious Cloud Server

Data Confidentiality and Integrity Preserving Outsourcing Algorithm for System of Linear Equation to a Malicious Cloud Server
View Sample PDF
Author(s): Malay Kumar (National Institute of Technology Raipur, India)and Manu Vardhan (National Institute of Technology Raipur, India)
Copyright: 2018
Pages: 28
Source title: Big Data Management and the Internet of Things for Improved Health Systems
Source Author(s)/Editor(s): Brojo Kishore Mishra (C. V. Raman College of Engineering, India)and Raghvendra Kumar (LNCT Group of Colleges, India)
DOI: 10.4018/978-1-5225-5222-2.ch003

Purchase


Abstract

Cloud computing has become a revolution in the field of computing, which enables flexible, on-demand, usage of computing resources in pay-as-per-use model. However, data and computation go to some third-party cloud server beyond the physical control of client escalates various privacy and security concern. This paper proposes an improved outsourcing algorithm for system of linear equation (SLE). The improvements are first, the existing work uses expensive cryptographic computation such as Paillier encryption for security arrangement, the proposed solution does not use such cryptographic primitives rather uses efficient linear transformation method. Secondly, the previous work uses an iterative process, which required 𝐿 rounds of communication between the client and cloud server, at the same time each iteration causes burden of a decryption followed by a matrix vector multiplication. However, the proposed solution required an optimal one round of communication and one-time transformation and retransformation service. Third, the previous work gives result verification method with (1/2l) error probability, the value of 𝑙 is a trade-off between security and efficiency. However, the proposed solution gives an error checking with an optimal probability of one. Moreover, a security analysis has been performed on the previous method, which proves marginal security arrangement due to inappropriate use of the Paillier encryption scheme. The proposal has been verified through theoretical and experimental analysis, which demonstrate the superiority of the proposed algorithm as compared to the existing algorithm.

Related Content

Nalini M.. © 2023. 22 pages.
Balachandar S., Chinnaiyan R.. © 2023. 19 pages.
V. A. Velvizhi, G. Senbagavalli, S. Malini. © 2023. 29 pages.
Amuthan Nallathambi, Kannan Nova. © 2023. 25 pages.
Amuthan Nallathambi, Sivakumar N., Velrajkumar P.. © 2023. 17 pages.
Nayana Hegde, Sunilkumar S. Manvi. © 2023. 18 pages.
Udayakumar K., Ramamoorthy S., Poorvadevi R.. © 2023. 26 pages.
Body Bottom