Font Size: a A A

Efficient And Secure Verifiable Outsourced Computation For Multiple Source Data

Posted on:2022-07-15Degree:MasterType:Thesis
Country:ChinaCandidate:P L LiFull Text:PDF
GTID:2518306722472894Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the continuous development and popularization of big data technology,including the gradual solidification of its application scenarios and the continuous expansion of application fields,the value of data has become increasingly prominent.The process of releasing the value of data is inseparable from two crucial stages,namely data sharing and data calculation.However,the process still faces the following two problems:?.Since data has the characteristics of low replication cost,the plain-text sharing of data is very likely to cause problems such as data value dilution and data leakage,etc.?.It is also worth noting that because most clients' local computing power is often not enough to support the large amount of computing resources that data calculation needs to consume,it also poses a threat to the efficient usage of data value locally.In response to the above analysis,this paper mainly studied a secure outsourced computing technology,proposed and implemented a secure outsourced computing platform based on the research results of this paper.The main innovations are as follows:?.An efficient data aggregation scheme is proposed.In view of the security problems that exist in the original scheme when the amount of aggregated data is small,this scheme adopts the technology of using more random numbers to blindly process the plaintext in the encryption phase to improve the encryption strength of the data.At the same time,this solution modifies the generation method of some public parameters,sets some public parameters as non-public parameters,uses a one-way trapdoor function to protect the sent data,and then sends the protected data to the receiver.At the same time,this paper demonstrates the security of the proposed efficient data aggregation scheme,namely the new scheme was proved to be CPA security.Through the demonstration,it can be obtained that for the improved scheme,its calculation efficiency and encryption and decryption efficiency are basically the same as the original scheme.Although the overall efficiency has not changed much,the security has been effectively improved.?.A fully homomorphic encryption algorithm is proposed.The algorithm can ensure that the ciphertext data operation with high availability is realized without using the classical fully homomorphic cryptographic primitives,and it has the characteristics of efficient ciphertext calculation and short ciphertext length,so as to save a lot of calculations.As well as storage space,at the same time,the time required for the algorithm also linearly increases with the increase in security requirements.In the context of big data,this algorithm can maintain good computing performance.Compared with other fully homomorphic encryption algorithms,it can also effectively improve system memory usage and external storage efficiency,and has good practicability.Based on this algorithm,data security and efficient collaborative computing of multiple data sources can be realized.With the data exchange and sharing,the algorithm can realize the fusion calculation of multiple source data,thereby expanding the data dimension and enhancing the value of the data.?.A secure verifiable outsourced computing platform is realized.The system is divided into clients and computing platform.The client completes data encryption and decryption operations,and submits computing tasks to the server.Under the premise of keeping their sensitive raw data from being leaked,the system allows clients with fewer computing resources/computing capabilities to outsource the data operations to a computing platform with a large number of computing resources;at the same time,the platform also provides clients with safe and reliable verification of computing results.Therefore,the platform meets the security(verifiability),privacy,and efficiency requirements of outsourced computing,which is convenient for practical application and promotion.Since the computing platform is based on ciphertext,the plaintext will not be exposed in the entire business process.In summary,under the secure outsourced computing platform proposed in this paper,because the data is homomorphically encrypted during the data sharing process,the original data does not flow out,and the data sharing process only shares the right to use the data without sharing the ownership of data,then realizing the protection of data value;on the other hand,the platform can make full use of cloud computing resources and save the manpower and construction costs of data owners.Therefore,the research content of this paper can provide certain new ideas and new models for the development of the privacy computing industry,help data release value,promote social and economic development,and protect national information security and stability.
Keywords/Search Tags:Data Sharing, FHE, Outsourced Computation, Privacy-Preserving Computation Platform
PDF Full Text Request
Related items