Secure Scalar Product for Big-Data in MapReduce

被引:5
|
作者
Liu, Fang [1 ]
Ng, Wee Keong [1 ]
Zhang, Wei [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Singapore 639798, Singapore
关键词
scalar product; secure data mining; cloud computing; MapReduce; big data; outsourced data;
D O I
10.1109/BigDataService.2015.9
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Organizations and individuals nowadays are more and more willing to outsource their data to save storage and management costs, especially with the push of cloud computing which is service-oriented and offers both storage and computation scalability. However, the data, once being released to a server, is no longer under its owner's control, and its privacy and security herein become a primary concern. To this end, users usually encrypt the private data before outsourcing it, which however makes cloud data mining services be very thorny and challenging as data is both big and encrypted. Under such new circumstance, we consider secure scalar product in this paper, which is a building block of data mining used to compute the sum of the products of corresponding values of two vectors. Existing methods either prevent privacy violation in the price of sacrificing accuracy, or requires users to take huge overhead. So, we propose a protocol called Secure Scalar Product in MapReduce ((SPM)-P-2), which is able to provide massive data processing services for encrypted big-data securely. (SPM)-P-2 lets the cloud be responsible for most of the operations while user only need to carry out a decryption operation to get the final result. We formally proved that S2PM can return the correct result and is secure. We also conducted performance analysis for (SPM)-P-2.
引用
收藏
页码:120 / 129
页数:10
相关论文
共 50 条
  • [31] Big-Data Clustering with Genetic Algorithm
    Mortezanezhad, Afsaneh
    Daneshifar, Ebrahim
    2019 IEEE 5TH CONFERENCE ON KNOWLEDGE BASED ENGINEERING AND INNOVATION (KBEI 2019), 2019, : 702 - 706
  • [32] A happy oyster is a big-data oyster
    Rutkin, Aviva
    NEW SCIENTIST, 2014, 221 (2958) : 23 - 23
  • [33] Big-Data Security Management Issues
    Paryasto, Marisa
    Alamsyah, Andry
    Rahardjo, Budi
    Kuspriyanto
    2014 2ND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2014,
  • [34] Perspective: Sustaining the big-data ecosystem
    Philip E. Bourne
    Jon R. Lorsch
    Eric D. Green
    Nature, 2015, 527 : S16 - S17
  • [35] An Efficient Industrial Big-Data Engine
    Basanta-Val, Pablo
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (04) : 1361 - 1369
  • [36] The DAQ needle in the big-data haystack
    Meschi, E.
    21ST INTERNATIONAL CONFERENCE ON COMPUTING IN HIGH ENERGY AND NUCLEAR PHYSICS (CHEP2015), PARTS 1-9, 2015, 664
  • [37] Perspective: Sustaining the big-data ecosystem
    Bourne, Philip E.
    Lorsch, Jon R.
    Green, Eric D.
    NATURE, 2015, 527 (7576) : S16 - S17
  • [38] A Middleware for Managing Big-Data Flows
    Gupta, Rajeev
    Gupta, Himanshu
    Gupta, Sanjeev
    Padmanabhan, Sriram
    WEB INFORMATION SYSTEMS ENGINEERING - WISE 2013, PT II, 2013, 8181 : 410 - 424
  • [39] Sports analytics and the big-data era
    Morgulev E.
    Azar O.H.
    Lidor R.
    International Journal of Data Science and Analytics, 2018, 5 (04) : 213 - 222
  • [40] Big-Data Applications in the Government Sector
    Kim, Gang-Hoon
    Trimi, Silvana
    Chung, Ji-Hyong
    COMMUNICATIONS OF THE ACM, 2014, 57 (03) : 78 - 85