Balancing the Computation-Intensive Function and User Privacy Disclosure at Different Security Levels

Varrey Dedipya, Mounica Bandaru


We propose a structure for protection safeguarding outsourced utilitarian calculation crosswise over substantial scale numerous encoded areas, which we allude to as POFD. With POFD, a client can get the yield of a capacity processed over encoded information from different spaces while ensuring the security of the capacity itself, its info and its yield. In particular, we present two thoughts of POFD, the essential POFD and its improved rendition, keeping in mind the end goal to tradeoff the levels of security insurance and execution. We display three conventions, named Multi-space Secure Multiplication protocol (MSM), Secure Exponent Calculation protocol with private Base (SECB), and Secure Exponent Calculation protocol (SEC), as the core sub-protocol for POFD to safely process the outsourced work. Point by point security examination demonstrates that the proposed POFD accomplishes the objective of ascertaining a client characterized work crosswise over various scrambled spaces without protection spillage to unapproved parties. Our execution assessments utilizing reenactments exhibit the utility and the productivity of POFD.


B. Chamberlin, “Iot (internet of things) will go nowhere without cloud computing and big data analytics,” of-things-will-go-nowhere-without-cloud-computing-and-bigdata- analytics/.


M. D. Dikaiakos, D. Katsaros, P. Mehra, G. Pallis, and A. Vakali, “Cloud computing: Distributed internet computing for IT and scientific research,” IEEE Internet Computing, vol. 13, no. 5, pp. 10–13, 2009.

L. Wang, J. Tao, M. Kunze, A. C. Castellanos, D. Kramer, and W. Karl, “Scientific cloud computing: Early definition and experience,” in 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008, 25-27 Sept. 2008, Dalian, China, 2008, pp. 825–830.

V. Kundra, “Federal cloud computing strategy,” docs/federal cloud- computing-strategy.pdf.

P. M. Figliola and E. A. Fischer, “Overview and issues for implementation of the federal cloud computing initiative: Implications for federal information technology reform management,”

“Amazon ec2,”

“The cloud computing and distributed systems (clouds) laboratory, university of melbourne,”

“Mobile & cloud computing laboratory (mobile & cloud lab),”

C.-W. Hsu, C.-C. Chang, C.-J. Lin et al., “A practical guide to support vector classification,” 2003.

J. Kamruzzaman, R. Sarker, I. Ahmad et al., “Svm based models for predicting foreign currency exchange rates,” in Data Mining, 2003. ICDM 2003. Third IEEE International Conference on. IEEE, 2003, pp. 557–560.

J. H. Min and Y.-C. Lee, “Bankruptcy prediction using support vector machine with optimal choice of kernel function parameters,” Expert systems with applications, vol. 28, no. 4, pp. 603–614, 2005.

S. Hua and Z. Sun, “Support vector machine approach for protein subcellular localization prediction,” Bioinformatics, vol. 17, no. 8, pp. 721–728, 2001.

P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Advances in Cryptology - EUROCRYPT ’99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding, 1999, pp. 223–238.

B. K. Samanthula, Y. Elmehdwi, and W. Jiang, “k-nearest neighbor classification over semantically secure encrypted relational data,” arXiv preprint arXiv:1403.5001, 2014

Full Text: PDF [Full Text]


  • There are currently no refbacks.

Copyright © 2013, All rights reserved.|

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at