Share Email Print
cover

Proceedings Paper

Secure data sharing in public cloud
Author(s): Kanaparti Venkataramana; Naveen Kumar R.; Sandhya Tatekalva; Padmavathamma M.
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

Secure multi-party protocols have been proposed for entities (organizations or individuals) that don't fully trust each other to share sensitive information. Many types of entities need to collect, analyze, and disseminate data rapidly and accurately, without exposing sensitive information to unauthorized or untrusted parties. Solutions based on secure multiparty computation guarantee privacy and correctness, at an extra communication (too costly in communication to be practical) and computation cost. The high overhead motivates us to extend this SMC to cloud environment which provides large computation and communication capacity which makes SMC to be used between multiple clouds (i.e., it may between private or public or hybrid clouds).Cloud may encompass many high capacity servers which acts as a hosts which participate in computation (IaaS and PaaS) for final result, which is controlled by Cloud Trusted Authority (CTA) for secret sharing within the cloud. The communication between two clouds is controlled by High Level Trusted Authority (HLTA) which is one of the hosts in a cloud which provides MgaaS (Management as a Service). Due to high risk for security in clouds, HLTA generates and distributes public keys and private keys by using Carmichael-R-Prime- RSA algorithm for exchange of private data in SMC between itself and clouds. In cloud, CTA creates Group key for Secure communication between the hosts in cloud based on keys sent by HLTA for exchange of Intermediate values and shares for computation of final result. Since this scheme is extended to be used in clouds( due to high availability and scalability to increase computation power) it is possible to implement SMC practically for privacy preserving in data mining at low cost for the clients.

Paper Details

Date Published: 8 June 2012
PDF: 5 pages
Proc. SPIE 8334, Fourth International Conference on Digital Image Processing (ICDIP 2012), 83342Y (8 June 2012); doi: 10.1117/12.956463
Show Author Affiliations
Kanaparti Venkataramana, Sri Venkateswara Univ. (India)
Naveen Kumar R., Sri Venkateswara Univ. (India)
Sandhya Tatekalva, Sri Venkateswara Univ. (India)
Padmavathamma M., Sri Venkateswara Univ. (India)


Published in SPIE Proceedings Vol. 8334:
Fourth International Conference on Digital Image Processing (ICDIP 2012)
Mohamed Othman; Sukumar Senthilkumar; Xie Yi, Editor(s)

© SPIE. Terms of Use
Back to Top