• May 27, 2016 News!The submission for Special Issue is officially open now!   [Click]
  • May 03, 2016 News!Vol.6, No.6 has been indexed by EI (Inspec).   [Click]
  • Mar 17, 2017 News!Vol.9, No.2 has been published with online version. 13 peer reviewed articles from 4 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2013 Vol.5(6): 920-923 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2013.V5.823

Secure Remote Data Processing in Cloud Computing

Mohd Rizuan Baharon, Qi Shi, David Llewellyn-Jones, and Madjid Merabti
Abstract—Cloud computing provides solutions as a service to meet customers’ needs such as massive data storage and a lot of computing resources to process customer data efficiently. To fully utilize such services, data need to be outsourced to Cloud Service Providers (CSPs). However, outsourcing precious data to the CSPs could lead to a disaster. Thus, the data need to be protected by means of encryption techniques. Primitive encryption techniques are ineffective to be used as such techniques required decryption process. To overcome such a problem, a fully homomorphic encryption (FHE) scheme is needed as the scheme enables encrypted data to be processed in an encrypted form. There are a number of existing FHE schemes have been proposed and improved upon, but efficiency is still a big obstacle for their implementation. Thus, in this paper, a new fully homomorphic encryption scheme based on finite fields that supports an n-multilinear map is proposed. The scheme should support the n-multilinear map so as to allow for arbitrary multiplications on encrypted data. Moreover, a new protocol that enables three or more parties to communicate with one another to process data in an encrypted form is proposed in this paper.

Index Terms—Cloud computing, elliptic curve groups, homomorphic encryption, n-multilinear map.

B. M. Rizuan, S. Qi, L. J. David, and M. Madjid are with the School of Computing and Mathematical Sciences, Liverpool John Moores University, Liverpool, L3 3AF, United Kingdom (e-mail: M.R.Baharon@ 2011.ljmu.ac.uk, Q.Shi@ljmu.ac.uk, D.Llewellyn-Jones@ljmu.ac.uk, M.Merabti@ljmu.ac.uk).

[PDF]

Cite:Mohd Rizuan Baharon, Qi Shi, David Llewellyn-Jones, and Madjid Merabti, "Secure Remote Data Processing in Cloud Computing," International Journal of Computer Theory and Engineering vol. 5, no. 6, pp. 920-923, 2013.

Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com