Abstract
Computation outsourcing using virtual environment is getting more and more prevalent in cloud computing, which several parties want to run a joint application and preserves the privacy of input data in secure computation protocols. However, it is still a challenging task to improve the efficiency and speed of secure floating point calculations in computation outsourcing, which has efficient secure integer calculations. Therefore, in this paper, we propose a framework built-up with a privacy-preserving computation toolkit with floating-point numbers (FPN), called PCTF. To achieve the above goal, we provide efficient toolkit to ensure their own data that FPN operations can be securely handled by homomorphic encryption algorithm. Moreover, we provide simulation results to experimentally evaluate the performance of the accuracy and the efficiency of PCTF, which will slowdown with 10x time consumption per in the secure floating-point addition and secure floating-point multiplication. Existing FPN division is constantly approaching result of division, or obtaining the quotient and remainder of division, in terms of precision, it is impossible to guarantee the precise range stably. However, our PCTF has higher precision in secure floating-point division, and the precision can be guaranteed at least \({10^{-17}}\).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mell, P., Grance, T.: The NIST definition of cloud computing (draft). NIST Special Publication 800-145 (2011)
Seagate Cor: Data age 2025 - the Evolution of Data to Life-Critical (2018). https://www.seagate.com/cn/zh/our-story/data-age-2025/. Accessed 2020
Chamberlin, B.: IoT (Internet of Things) Will go Nowhere Without Cloud Computing and Big Data Analytics. http://ibmcai.com/2014/11/20/iot-internet-of-things-will-go-nowhere-without-cloud-computing-and-big-data-analytics/
Yeshodara, N.S., Nagojappa, N.S., Kishore, N.: Cloud based self driving cars. In: 2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), Bangalore, India, pp. 1–7 (2014). https://doi.org/10.1109/CCEM.2014.7015485
Quick, D., Martini, B., Choo, R.: Cloud Storage Forensics. Elsevier, Amsterdam (2013)
Mohassel, P., Zhang, Y.: SecureML: a system for scalable privacy-preserving machine learning. In: IEEE Symposium on Security and Privacy (SP), IEEE 2017, pp. 19–38 (2017)
Wang, X., Ma, J., Miao, Y., Liu, X., Yang, R.: Privacy-preserving diverse keyword search and online pre-diagnosis in cloud computing. IEEE Trans. Serv. Comput. (2019)
Sun, W., Yu, S., Lou, W., Hou, Y.T., Li, H.: Protecting your right: attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud. In: Proceedings of INFOCOM, pp. 226–234. IEEE (2014)
Bidi Ying, D.M., Mouftah, H.T.: Sink privacy protection with minimum network traffic in WSNs. Ad Hoc Sens. Wirel. Netw. 25(1–2), 69–87 (2015)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48910-X_16
Cloud Computing. https://en.wikipedia.org/wiki. Accessed 2019
López-Alt, A., Tromer, E., Vaikuntanathan, V.: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: Proceedings of 44th Annual ACM Symposium on Theory Computing, pp. 1219–1234 (2012)
Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 36–54. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-44598-6_3
Sanil, A.P., Karr, A.F., Lin, X., Reiter, J.P.: Privacy preserving regression modelling via distributed computation. In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2004), pp. 677–682. ACM (2004)
Lazzeretti, R., Barni, M.: Division between encrypted integers by means of garbled circuits. In: WIFS 2011, pp. 1–6 (2011)
Dahl, M., Ning, C., Toft, T.: On secure two-party integer division. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 164–178. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32946-3_13
Liu, X., Choo, K.-K.R., Deng, R.H., Lu, R., Weng, J.: Efficient and privacy-preserving outsourced calculation of rational numbers. IEEE Trans. Depend. Secur. Comput. 15, 27–39 (2016)
Liu, X., Deng, R.H., Choo, K.-K.R., Weng, J.: An efficient privacy-preserving outsourced calculation toolkit with multiple keys. IEEE Trans. Inf. Forensics Secur. 11(11), 2401–2414 (2016)
Veugen, T.: Encrypted integer division and secure comparison. IJACT 3(2), 166–180 (2014)
Catrina, O., Saxena, A.: Secure computation with fixed-point numbers. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 35–50. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14577-3_6
Kiltz, E., Leander, G., Malone-Lee, J.: Secure computation of the mean and related statistics. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 283–302. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-30576-7_16
Bogdanov, D., Niitsoo, M., Toft, T., et al.: High-performance secure multi-party computation for data mining applications. Int. J. Inf. Secur. 11(6), 403–418 (2012)
Bunn, P., Ostrovsky, R.: Secure two-party k-means clustering. In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28–31, 2007. ACM (2007)
Catrina, O., Dragulin, C.: Multiparty computation of fixed-point multiplication and reciprocal. In: DEXA 2009, no. 1, pp. 107–111 (2009)
Acknowledgement
This work is supported by the National Natural Science Foundation of China (Grant No. U1705262, No. 62072109, No. U1804263), and the Natural Science Foundation of Fujian Province (Grant No. 2018J07005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Chen, Z., Zheng, Z., Liu, X., Guo, W. (2021). Privacy-Preserving Computation Tookit on Floating-Point Numbers. In: Xiong, J., Wu, S., Peng, C., Tian, Y. (eds) Mobile Multimedia Communications. MobiMedia 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 394. Springer, Cham. https://doi.org/10.1007/978-3-030-89814-4_33
Download citation
DOI: https://doi.org/10.1007/978-3-030-89814-4_33
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-89813-7
Online ISBN: 978-3-030-89814-4
eBook Packages: Computer ScienceComputer Science (R0)