Book Details

SECURE MULTIPARTY COMPUTATION FOR PRIVACY-PRESERVING CLOUD COMPUTING

International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format

Abstract

Secure multi-party computation (also known as secure computation or multi-party computation/MPC) is a subfield of cryptography with the objective to create methods for parties to equally compute a function more their inputs, and maintenance these inputs private [1].In this paper, we survey the basic paradigms and notions of secure multiparty computation and talk about their significance to the field of privacypreserving data mining and cloud computing. In addition to reviewing definition and constructions for secure multiparty computation, we discuss the issue of efficiency and demonstrate the difficulties involved in constructing greatly efficient protocols. We also there common errors that are prevalent in the writing when secure multiparty computation techniques are useful to privacy-preserving data mining and cloud computing. Finally, we talk about the relationship among secure multiparty computation and privacy-preserving data mining and cloud computing [2].

References

[1].https://en.wikipedia.org/wiki /Secure Multiparty Computation.pdf
[2]. Yehuda Lindell and Benny Pinkas,. “Secure Multiparty Computation for Privacy-Preserving Data Mining” The Journal of Privacy and Confidentiality (2009) 1, Number 1, pp. 59–98.
[3]. Andrew C. Yao, Protocols for secure computations (extended abstract)
[4]D.Chaum,C.CrepeauandI.Damgard.“Multipartyunconditio nallysecureprotocols”. .
[5]O.Goldreich,S.MicaliandA.Wigderson.“How to play any mental game or a completeness theorem for protocols with honest majority”. .
[6] Peter Bogetoft, Dan Lund Christensen, Ivan Damgård, Martin Geisler, Thomas Jakobsen, Mikkel Krøigaard, Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielse, Jakob Pagter, Michael Schwartzbach and Tomas Toft (2008).“Multiparty Computation Goes Live”. nrm me clr atc(Report2008/068).
[7]. Vaibhav Kumar, R. P. Ojha, ” Mobile Proactive Secret Sharing in Cloud Computing” IJRREST: International Journal of Research Review in Engineering Science and Technology (ISSN 2278- 6643) | Volume-1 Issue-2, September 2012 ,page no 67.
[8]. Twin Clouds: An Architecture for Secure Cloud Computing(Extended Abstract), Sven Bugiel, Stefan Nu¨rnberger, Ahmad-Reza Sadeghi, Thomas Schneider
[9]. Danish jamil et al. / international journal of engineering science and technology (ijest),”Security issues in cloud computing and countermeasures”
[10]. Secure Outsourced Computation in a Multi-tenant Cloud, Seny Kamara Microsoft Research senyk@microsoft.com,Mariana Raykova Columbia University mariana@cs.columbia.edu
[11]. On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing,Marten van Dijk RSA Laboratories marten.vandijk@rsa.com,Ari Juels RSA Laboratoriesajuels@rsa.com
[12].https://cs.uccs.edu/~cs691/studentproj/projM2011/halsha mm/doc/Security%20Issues%20In%20Cloud%20Comuting.pdf
[13]https://www.journal-archieves14.webs.com/1323-1329.pdf
[14.]https://technofist.com/project%20list/cs/CloudComputing/AN%20EFFICIENT%20SECURITY%20MODEL%20IN%20CLOUD%20COMPUTING%20BASED%20ON%20SOFT 20COMPUTING%20TECHNIQUES.pdf

Keywords

Secure Multiparty Computation (SMC), Cloud computing, privacy-preserving and data mining.

Image
  • Format Volume 3, Issue 2, No 2, 2015
  • Copyright All Rights Reserved ©2015
  • Year of Publication 2015
  • Author S.Tamizharasi, K. Ravikumar
  • Reference IJCS-101
  • Page No 580-582.

Copyright 2024 SK Research Group of Companies. All Rights Reserved.