An Extended Framework of Privacy-Preserving Computation With Flexible Access Control

Cloud computing offers various services based on outsourced data by utilizing its huge volume of resources and great computation capability. However, it also makes users lose full control over their data. To avoid the leakage of user data privacy, encrypted data are preferred to be uploaded and stored in the cloud, which unfortunately complicates data analysis and access control. In particular, few existing works consider the fine-grained access control over the computational results from ciphertexts. Though our previous work proposed a framework to support several basic computations (such as addition, multiplication and comparison) with flexible access control, privacy-preserving division calculations over encrypted data, as a crucial operation in many statistical processes and machine learning algorithms, is neglected. In this paper, we propose four privacy-preserving division computation schemes with flexible access control to fill this gap, which can adapt to various application scenarios. Furthermore, we extend a division scheme over encrypted integers to support privacy-preserving division over multiple data types including fixed-point numbers and fractional numbers. Finally, we give their security proof and show their efficiency and superiority through comprehensive simulations and comparisons with existing work.

[1]  Eike Kiltz,et al.  Secure Computation of the Mean and Related Statistics , 2005, IACR Cryptol. ePrint Arch..

[2]  Stefan Katzenbeisser,et al.  Efficiently Outsourcing Multiparty Computation Under Multiple Keys , 2013, IEEE Transactions on Information Forensics and Security.

[3]  Rui Hu,et al.  A survey on data provenance in IoT , 2019, World Wide Web.

[4]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[5]  Stefan Katzenbeisser,et al.  Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.

[6]  Robert H. Deng,et al.  Server-Aided Revocable Attribute-Based Encryption , 2016, ESORICS.

[7]  Laurence T. Yang,et al.  A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion , 2019, Inf. Fusion.

[8]  D. Richard Kuhn,et al.  An Access Control scheme for Big Data processing , 2014, 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[9]  Robert H. Deng,et al.  Privacy-Preserving Data Processing with Flexible Access Control , 2020, IEEE Transactions on Dependable and Secure Computing.

[10]  Octavian Catrina,et al.  Secure Computation with Fixed-Point Numbers , 2010, Financial Cryptography.

[11]  Robert H. Deng,et al.  Encrypted data processing with Homomorphic Re-Encryption , 2017, Inf. Sci..

[12]  Wei Jiang,et al.  An efficient and probabilistic secure bit-decomposition , 2013, ASIA CCS '13.

[13]  Rui Zhang,et al.  Verifiable outsourced computation over encrypted data , 2019, Inf. Sci..

[14]  Robert H. Deng,et al.  HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing , 2012, IEEE Transactions on Information Forensics and Security.

[15]  Stefan Katzenbeisser,et al.  Secure computations on non-integer values , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[16]  Qing Zhu,et al.  Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment , 2020, IEEE Transactions on Dependable and Secure Computing.

[17]  Zekeriya Erkin,et al.  Privacy enhanced recommender system , 2010 .

[18]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[19]  Mauro Conti,et al.  A Survey on Homomorphic Encryption Schemes , 2017, ACM Comput. Surv..

[20]  Thijs Veugen,et al.  Encrypted integer division and secure comparison , 2014, Int. J. Appl. Cryptogr..

[21]  Zekeriya Erkin,et al.  Secure Fixed-point Division for Homomorphically Encrypted Operands , 2018, ARES.

[22]  Prasanna Palsodkar,et al.  Design and implementation of goldschmidts algorithm for floating point division and square root , 2015, 2015 International Conference on Communications and Signal Processing (ICCSP).

[23]  Yao Zheng,et al.  Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.

[24]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[25]  Ming Li,et al.  A tale of two clouds: Computing on data encrypted under multiple keys , 2014, 2014 IEEE Conference on Communications and Network Security.

[26]  Tomas Toft,et al.  On Secure Two-Party Integer Division , 2012, Financial Cryptography.

[27]  Dan Liu,et al.  A Survey on Secure Data Analytics in Edge Computing , 2019, IEEE Internet of Things Journal.

[28]  Rafail Ostrovsky,et al.  Secure two-party k-means clustering , 2007, CCS '07.

[29]  Masahiro Yagisawa,et al.  Fully Homomorphic Encryption without bootstrapping , 2015, IACR Cryptol. ePrint Arch..

[30]  Robert H. Deng,et al.  Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers , 2018, IEEE Transactions on Dependable and Secure Computing.