全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Secure and Efficient Outsourced Computation in Cloud Computing Environments

DOI: 10.4236/jsea.2024.179040, PP. 750-762

Keywords: Secure Computation, Cloud Computing, Homomorphic Encryption, Secure Multiparty Computation, Resource Optimization

Full-Text   Cite this paper   Add to My Lib

Abstract:

Secure and efficient outsourced computation in cloud computing environments is crucial for ensuring data confidentiality, integrity, and resource optimization. In this research, we propose novel algorithms and methodologies to address these challenges. Through a series of experiments, we evaluate the performance, security, and efficiency of the proposed algorithms in real-world cloud environments. Our results demonstrate the effectiveness of homomorphic encryption-based secure computation, secure multiparty computation, and trusted execution environment-based approaches in mitigating security threats while ensuring efficient resource utilization. Specifically, our homomorphic encryption-based algorithm exhibits encryption times ranging from 20 to 1000 milliseconds and decryption times ranging from 25 to 1250 milliseconds for payload sizes varying from 100 KB to 5000 KB. Furthermore, our comparative analysis against state-of-the-art solutions reveals the strengths of our proposed algorithms in terms of security guarantees, encryption overhead, and communication latency.

References

[1]  Afzali, M., Pourmohammadi, H. and Mohammad Vali Samani, A. (2022) An Efficient Framework for Trust Evaluation of Secure Service Selection in Fog Computing Based on QoS, Reputation, and Social Criteria. Computing, 104, 1643-1675.
https://doi.org/10.1007/s00607-022-01053-w
[2]  Alshareef, H.N. (2023) Current Development, Challenges, and Future Trends in Cloud Computing: A Survey. International Journal of Advanced Computer Science and Applications, 14, 329-338.
https://doi.org/10.14569/ijacsa.2023.0140337
[3]  Anu, T.S. and Gopika, P. (2024) Privacy Preserving Many-Sided Shield in Cloud Environment. International Research Journal of Innovations in Engineering and Technology, 8, 148-154.
[4]  Hundera, N.W., Jin, C., Geressu, D.M., Aftab, M.U., Olanrewaju, O.A. and Xiong, H. (2021) Proxy-Based Public-Key Cryptosystem for Secure and Efficient IoT-Based Cloud Data Sharing in the Smart City. Multimedia Tools and Applications, 81, 29673-29697.
https://doi.org/10.1007/s11042-021-11685-3
[5]  Jia, H., Cai, D., Yang, J., Qian, W., Wang, C., Li, X., et al. (2023) Efficient and Privacy-Preserving Image Classification Using Homomorphic Encryption and Chunk-Based Convolutional Neural Network. Journal of Cloud Computing, 12, Article No. 175.
https://doi.org/10.1186/s13677-023-00537-0
[6]  Jin, X., Hua, W., Wang, Z. and Chen, Y. (2022) A Survey of Research on Computation Offloading in Mobile Cloud Computing. Wireless Networks, 28, 1563-1585.
https://doi.org/10.1007/s11276-022-02920-2
[7]  Khan, N., Jianbiao, Z., Lim, H., Ali, J., Ullah, I., Salman Pathan, M., et al. (2023) An ECC-Based Mutual Data Access Control Protocol for Next-Generation Public Cloud. Journal of Cloud Computing, 12, Article No. 101.
https://doi.org/10.1186/s13677-023-00464-0
[8]  Kumar, A., Khan, S.B., Pandey, S.K., Shankar, A., Maple, C., Mashat, A., et al. (2023) Development of a Cloud-Assisted Classification Technique for the Preservation of Secure Data Storage in Smart Cities. Journal of Cloud Computing, 12, Article No. 92.
https://doi.org/10.1186/s13677-023-00469-9
[9]  Lavanya, S. and Saravanakumar, N.M. (2022) Secured Two Factor Authentication, Graph Based Replication and Encryption Strategy in Cloud Computing. Multimedia Tools and Applications, 82, 16105-16125.
https://doi.org/10.1007/s11042-022-13838-4
[10]  Yan, L., Wang, G., Yin, T., Liu, P., Feng, H., Zhang, W., et al. (2024) Attribute-Based Searchable Encryption: A Survey. Electronics, 13, Article 1621.
https://doi.org/10.3390/electronics13091621
[11]  Lin, W., Ma, J., Li, T., Ye, H., Zhang, J. and Xiao, Y. (2024) CrptAC: Find the Attack Chain with Multiple Encrypted System Logs. Electronics, 13, Article 1378.
https://doi.org/10.3390/electronics13071378
[12]  Liu, X., Liu, X., Xiong, N., Luo, D., Xu, G. and Chen, X. (2023) AAJS: An Anti-Malicious Attack Graphic Similarity Judgment System in Cloud Computing Environments. Electronics, 12, Article 1983.
https://doi.org/10.3390/electronics12091983
[13]  Lu, Y., Wu, Z., Zhang, B. and Ren, K. (2023) Efficient Secure Computation from SM Series Cryptography. Wireless Communications and Mobile Computing, 2023, Article ID: 6039034.
https://doi.org/10.1155/2023/6039034
[14]  Malik, A.W., Bhatti, D.S., Park, T., Ishtiaq, H.U., Ryou, J. and Kim, K. (2024) Cloud Digital Forensics: Beyond Tools, Techniques, and Challenges. Sensors, 24, Article 433.
https://doi.org/10.3390/s24020433
[15]  Mangala, N., Eswara Reddy, B. and Venugopal, K.R. (2023) Light Weight Circular Error Learning Algorithm (CELA) for Secure Data Communication Protocol in IoT-Cloud Systems. International Journal of Advanced Computer Science and Applications, 14, 845-858.
https://doi.org/10.14569/ijacsa.2023.0140792
[16]  Arif, M., Ajesh, F., Shamsudheen, S. and Shahzad, M. (2022) Secure and Energy-Efficient Computational Offloading Using LSTM in Mobile Edge Computing. Security and Communication Networks, 2022, Article ID: 4937588.
https://doi.org/10.1155/2022/4937588
[17]  Babenko, M., Golimblevskaia, E., Tchernykh, A., Shiriaev, E., Ermakova, T., Pulido-Gaytan, L.B., et al. (2023) A Comparative Study of Secure Outsourced Matrix Multiplication Based on Homomorphic Encryption. Big Data and Cognitive Computing, 7, Article 84.
https://doi.org/10.3390/bdcc7020084
[18]  Babenko, M., Tchernykh, A., Pulido-Gaytan, B., Avetisyan, A., Nesmachnow, S., Wang, X., et al. (2022) Towards the Sign Function Best Approximation for Secure Outsourced Computations and Control. Mathematics, 10, Article 2006.
https://doi.org/10.3390/math10122006
[19]  Dabra, M., Sharma, S., Kumar, S. and Min, H. (2024) An Improved Finegrained Ciphertext Policy Based Temporary Keyword Search on Encrypted Data for Secure Cloud Storage. Scientific Reports, 14, Article No. 5264.
https://doi.org/10.1038/s41598-024-56112-3
[20]  Daoud, W.B., Othmen, S., Hamdi, M., Khdhir, R. and Hamam, H. (2023) Fog Computing Network Security Based on Resources Management. EURASIP Journal on Wireless Communications and Networking, 2023, Article No. 50.
https://doi.org/10.1186/s13638-023-02256-1
[21]  Dawood, M., Tu, S., Xiao, C., Alasmary, H., Waqas, M. and Rehman, S.U. (2023) Cyberattacks and Security of Cloud Computing: A Complete Guideline. Symmetry, 15, Article 1981.
https://doi.org/10.3390/sym15111981
[22]  Du, J., Dong, G., Ning, J., Xu, Z. and Yang, R. (2024) Identity-Based Controlled Delegated Outsourcing Data Integrity Auditing Scheme. Scientific Reports, 14, Article No. 7582.
https://doi.org/10.1038/s41598-024-58325-y
[23]  Fan, C., Jia, P., Lin, M., Wei, L., Guo, P., Zhao, X., et al. (2023) Cloud-Assisted Private Set Intersection via Multi-Key Fully Homomorphic Encryption. Mathematics, 11, Article 1784.
https://doi.org/10.3390/math11081784
[24]  Fugkeaw, S. (2023) An Efficient and Scalable Vaccine Passport Verification System Based on Ciphertext Policy Attribute-Based Encryption and Blockchain. Journal of Cloud Computing, 12, Article No. 111.
https://doi.org/10.1186/s13677-023-00486-8
[25]  Guo, X., Li, Y., Jiang, Y., Wang, J. and Fang, J. (2023) Privacy-Preserving K-Nearest Neighbor Classification over Malicious Participants in Outsourced Cloud Environments. Cryptography, 7, Article 59.
https://doi.org/10.3390/cryptography7040059
[26]  Hossain, M., Kayas, G., Hasan, R., Skjellum, A., Noor, S. and Islam, S.M.R. (2024) A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives. Future Internet, 16, Article 40.
https://doi.org/10.3390/fi16020040
[27]  Munjal, K. and Bhatia, R. (2022) A Systematic Review of Homomorphic Encryption and Its Contributions in Healthcare Industry. Complex & Intelligent Systems, 9, 3759-3786.
https://doi.org/10.1007/s40747-022-00756-z
[28]  Pandipati, B. and Sam, R.P. (2022) Sureness Calamity Salvage Framework with Inventive Bandwidth Scheme for Data Storage in Cloud Computing. Multimedia Tools and Applications, 82, 17567-17598.
https://doi.org/10.1007/s11042-022-13745-8
[29]  Park, J. and Lee, D.H. (2022) Parallelly Running and Privacy-Preserving K-Nearest Neighbor Classification in Outsourced Cloud Computing Environments. Electronics, 11, Article 4132.
https://doi.org/10.3390/electronics11244132
[30]  Periasamy, J.K., Selvam, L., Anuradha, M. and Kennady, R. (2024) A Fuzzy Optimal Lightweight Convolutional Neural Network for Deduplication Detection in Cloud Server. Iranian Journal of Fuzzy Systems, 21, 33-49.

Full-Text

Contact Us

[email protected]

QQ:3279437679

WhatsApp +8615387084133