期刊文献+

云外包计算中空间位置关系的保密判定 被引量:11

Privacy-Preserving Determination of Spatial Location-Relation in Cloud Computing
下载PDF
导出
摘要 目前安全多方几何计算问题都是在传统模式下依靠参与方交互完成,文中首次将安全多方几何计算问题转移到云计算平台下借助不可信第三方云服务器参与完成,这为安全多方计算提供了一个新的研究方向.传统模式下空间位置关系的保密判定已存方案,大多是把原问题转化为距离问题或数据对应成比例问题,造成了用户计算成本过大,或能判断的位置关系有限,而且这些方法只能由参与方相互交互完成,因此在云计算平台下并不适用.针对这些问题,文中首先将原问题转化为夹角问题,接着设计了适用于云外包计算的内积协议,然后基于此内积协议在云平台下解决了点线、线线、点面、线面、面面五种空间位置关系的保密判定,并用模拟范例证明了协议的安全性.最后的分析和比较显示,文中不但首次设计了云计算平台下空间位置关系的保密判断协议,并且设计的方案能判断的位置关系更加广泛,也为用户节省了更多的计算成本.此外,我们设计的内积协议可以作为一种新的云计算技术的基础协议,可以被其他协议调用. Up to now, all secure multi-par ty geometric computation problems are conducted underthe conditional pattern, which is handled only by the interaction of participants. In this paper, we first transform this traditional pattern into the cloud computing pattern, which allows the untrusted third party (i. e. , the cloud server) involved in the procedure of calculation. This manner provides a new research direction for secure multi-party computation. The most existing schemes about privacy-preserving determination of spatial location-relation transform the original problem into either the distance problem or the correspondingly proportional data problem and solve it with traditional pattern. These approaches burden the user’ s computation overhead or limit the range of determining location-relation, moreover, with which the participants accomplish the computation task only by their interactive with each other. It is not suitable for secure mult- party computation in cloud computing. Aiming at these problems, we first transform the original problem into the included angle problem, then design a novel protocol of scalar product available for cloud computing, and further determine the five spatial location-relation: point and line, point and plane, line and line, line and plane, and plane and plane in cloud computing. Lastly, we prove the security of our protocols with simulation paradigm. The analysis indicates it is the first that we design the protocol for preserving-privacy determination of spatial location-relation in cloud computing, which can not only save more computation cost for users but also determine more location-relation than the known schemes. In addition, the proposed scalar protocol in this work as the new technique of cloud computing can be used a building-block, which can be invoked by other schemes.
出处 《计算机学报》 EI CSCD 北大核心 2017年第2期351-363,共13页 Chinese Journal of Computers
基金 国家自然科学基金(61272435 61472146) 西安科技大学博士启动基金(2015QDJ008) 信息安全国家重点实验室开放课题基金(2016-MS-19) 广东省自然科学基金杰出青年基金(2014A030306021) 广东特支计划科技青年拔尖人才(2015TQ01X796) 广州市珠江科技新星专项(201610010037) 江苏省优势学科PAPD和江苏省大气环境与装备技术协同创新中心CICAEET(KJR1615)资助~~
关键词 安全多方计算 位置关系 空间几何 内积协议 云计算 secure multi-party computation location-relation spatial geometry scalar productprotocol cloud computing
  • 相关文献

参考文献3

二级参考文献31

  • 1Shun-DongLi Yi-QiDai.Secure Two-Party Computational Geometry[J].Journal of Computer Science & Technology,2005,20(2):258-263. 被引量:36
  • 2LI Shundong,DAI Yiqi,WANG Daoshun,LUO Ping.A secure multi-party computation solution to intersection problems of sets and rectangles[J].Progress in Natural Science:Materials International,2006,16(5):538-545. 被引量:7
  • 3LUO Yonglong,HUANG Liusheng,CHEN Guoliang,SHEN Hong.Privacy-Preserving Distance Measurement and Its Applications[J].Chinese Journal of Electronics,2006,15(2):237-241. 被引量:15
  • 4O. Gotdreich. Secure multl-party computation (manuscript version 1.3). http ://theory. lcs. mit. edu/- oded, 2002.
  • 5A. C. Yao. Protocols for secure computations. In: Proc. 23rd Annual IEEE Symposium on Foundations of Computer Science.Los Alamitos: IEEE Computer Society Press, 1982. 160 - 164.
  • 6C. Cachin. Efficient private bidding and auctions with an oblivious third party. In: Proe. 6th ACM Conf. Computer and Communications Security. New York: ACM Press, 1999. 120-127.
  • 7A. C. Yao. How to generate and exchange secrets. In; Proe.27th IEEE Symposium on Foundations of Computer Science, Los Alamitos: IEEE Computer Society Press, 1986. 162- 167.
  • 8O. Goldreich, S. Micali, A. Wigderson. How to play any mental game. In: Prec. 19th Annual ACM Symposium on Theory of Computing. New York: ACM Press, 1987. 218-229.
  • 9S. Goldwasser. Multi-party computations: Past and present, In:Proc. 16th Annual ACM Symposium on Principles of Distributed Computing. New York: ACM Press, 1997. 1 -6.
  • 10Mikhail J. Atallah, Wenliang Du. Secure muhi-party computational geometry. In: Lecture Notes in Computer Science 2125. Berlin: Springer, 2001. 165-179.

共引文献63

同被引文献101

引证文献11

二级引证文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部