You are on page 1of 14

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 17, NO.

2, MARCH/APRIL 2020 363

Privacy-Preserving Data Processing


with Flexible Access Control
Wenxiu DING , Zheng Yan , Senior Member, IEEE, and Robert H. Deng , Fellow, IEEE

Abstract—Cloud computing provides an efficient and convenient platform for cloud users to store, process and control their data.
Cloud overcomes the bottlenecks of resource-constrained user devices and greatly releases their storage and computing burdens.
However, due to the lack of full trust in cloud service providers, the cloud users generally prefer to outsource their sensitive data in an
encrypted form, which, however, seriously complicates data processing, analysis, as well as access control. Homomorphic encryption
(HE) as a single key system cannot flexibly control data sharing and access after encrypted data processing. How to realize various
computations over encrypted data in an efficient way and at the same time flexibly control the access to data processing results has
been an important challenging issue. In this paper, we propose a privacy-preserving data processing scheme with flexible access
control. With the cooperation of a data service provider (DSP) and a computation party (CP), our scheme, based on Paillier’s partial
homomorphic encryption (PHE), realizes seven basic operations, i.e., Addition, Subtraction, Multiplication, Sign Acquisition, Absolute,
Comparison, and Equality Test, over outsourced encrypted data. In addition, our scheme, based on the homomorphism of attribute-
based encryption (ABE), is also designed to support flexible access control over processing results of encrypted data. We further prove
the security of our scheme and demonstrate its efficiency and advantages through simulations and comparisons with existing work.

Index Terms—Homomorphic encryption, privacy preservation, data sharing, attribute-based encryption

1 INTRODUCTION

C LOUD computing has been widely adopted in various


application domains owing to its specific advantages.
It enables cloud users to store their data and perform var-
data before uploading them to the cloud. However,
data encryption introduces several challenges as described
below.
ious computations on the data without incurring a high First, encryption seriously restricts computations and
cost. With the advent of Internet of Things, enormous analyses over the outsourced data in the cloud. With tradi-
amounts of data are produced and outsourced to the tional encryption algorithms (e.g., AES), it is impossible for
cloud or cloudlets for storage and analysis. Data analysis the cloud to process the encrypted data directly. Some exist-
helps to gain insights on related entities in a physical ing efforts adopted partial homomorphic encryption (PHE)
world, which can provide tremendous values to various to solve the problem, but they are limited to multiplication
applications in multifarious domains (e.g., medical [1] and addition operations on encrypted data [3], [4], which
and business [2]). cannot satisfy the demands of many applications. More
However, the cloud may not be fully trusted by cloud operations, such as sign acquisition, comparison, absolute
users since it may reveal or disclose the data outsourced by and equality test, are expected to be supported in practice
the cloud users or their processing results, which may seri- [5], [6]. This requests further study on privacy-preserving
ously impact user privacy. For example, medical case analy- computations. More basic operations over ciphertexts can
sis can help in predicting potential illness, but patients may obviously support more applications that apply different
be reluctant to provide their health data due to privacy con- functions and algorithms, e.g., privacy-preserving classifica-
cerns. Therefore, it is of great significance to protect sensitive tions in machine learning [7], trust evaluation in Internet of
data and data processing results from being leaked to any Things [8], and medical analysis in e-health [9]. To realize
unauthorized parties. A standard solution is to encrypt the arbitrary computations over ciphertexts, schemes based on
fully homomorphic encryption (FHE) were designed [10],
[11], [12]. However, most FHE based schemes suffer from
 W. Ding is with the State Key Laboratory on Integrated Services Net-
works, School of Cyber Engineering, Xidian University, Changan Qu huge computational overhead and high storage cost, which
710126, China. E-mail: wenxiuding_1989@126.com. make them impractical for real world deployment and wide
 Z. Yan is with the State Key Lab on Integrated Services Networks, School use. Currently, the literature still lacks serious studies on
of Cyber Engineering, Xidian University, No.2 South Taibai Road, Xi’an efficient computations over ciphertexts.
710071 China, and with the Department of Communications and Network-
ing, Aalto University, Konemiehentie 2, P.O.Box 15400, Espoo 02150, Second, multi-user access control over ciphertext proc-
Finland. E-mail: zyan@xidian.edu.cn. essing results should also be supported [13]. Existing PHE
 R.H. Deng is with the School of Information Systems, Singapore Manage- and FHE schemes are both single-user systems, which
ment University, Singapore 188065. E-mail: robertdeng@smu.edu.sg.
inherently lack support on multi-user access to the process-
Manuscript received 22 July 2017; revised 27 Nov. 2017; accepted 7 Dec. ing results of encrypted data. The scheme based on PHE
2017. Date of publication 22 Dec. 2017; date of current version 18 Mar. 2020.
(Corresponding author: Zheng Yan.) [14] supports distribution of addition operation results
Digital Object Identifier no. 10.1109/TDSC.2017.2786247 through an interactive protocol between two servers. But
1545-5971 ß 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution
requires IEEE permission. See ht_tps://www.ieee.org/publications/rights/index.html for more information.
364 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 17, NO. 2, MARCH/APRIL 2020

this protocol must be executed for each data request, thus it any input. It lays a technical foundation for many problems,
is inefficient. Attribute-based encryption (ABE) is an effec- such as database query, intrusion detection and data mining
tive tool to support fine-grained access control and multi- with privacy preservation [8]. Several schemes [26], [27]
user access. It has been applied in many application scenar- based on the popular SMC construction Sharemind [28]
ios [15], [16], [17]. However, to our knowledge, there is no were proposed to achieve various secure computations,
effort in the literature on fine-grained access control over e.g., multiplication. But the product of N pieces of data
the computation/analysis results based on encrypted data. needs about 3N multiplications of 32-bit numbers under the
Our previous work [18] aims to solve this problem by com- cooperation of three involved servers, which obviously can-
bining homomorphic encryption and proxy re-encryption, not adapt to big data processing. Although a data requester
but it only supports one requester access at one time. In case can easily obtain the final result by requesting all secret pre-
multiple users want to access the same result, it needs to processing shares from all involved servers, how to realize
execute the designed scheme for each requester one by one, fine-grained access control in SMC is still an open issue.
which obviously incurs high communication and computa-
tion costs, as shown in experiments in Section 5.2.3. 2.2 Secure Data Processing Based on
In this paper, we propose a novel scheme in order to Homomorphic Encryption
overcome the challenges as described above. It supports FHE schemes [10], [11], [12] are designed to realize arbitrary
multiple basic computations over encrypted data and real- computations over encrypted data. Due to high computation
izes flexible access control over the processing results by overhead, some extended schemes [29], [30] were proposed
employing PHE and ABE. Specifically, the contributions of to improve FHE efficiency. However, the computation and
this paper can be summarized as follows: storage costs of existing schemes are still not satisfactory for
We propose a generic system architecture consisting of practical use [31], [32].
a data service provider (DSP) and a computation party PHE has been widely used in many applications because
(CP) that seamlessly work together to simultaneously it is more efficient and practical than FHE although it can
support secure computations over encrypted data and only support limited computations. Some schemes [3], [4]
fine-grained access control of computation results. were proposed to support more types of computations, but
 We present a family of protocols to efficiently realize they can only support addition and multiplication over a
seven basic computations over encrypted data: Addi- limited number of data inputs. In [3], decryption requires
tion, Subtraction, Multiplication, Sign Acquisition, Abso- solving the problem of discrete logarithm, which seriously
lute, Comparison, and Equality Test. restricts the length and the number of data inputs. The mul-
 We propose to utilize ABE with homomorphism to tiparty computation framework proposed in [4] achieves
realize fine-grained access control of the processing addition and multiplication by applying secret sharing.
result of encrypted data, which is not revealed to Similar to the SMC-based scheme in [27], it is unable to sup-
any system entities including DSP and CP. port the multiplication of a large number of data inputs. Liu
 We prove the security of the proposed scheme and et al. [5] proposed a framework for efficient outsourced data
demonstrate its efficiency through simulations and calculations with privacy preservation, which can deal with
comparisons with existing schemes. We show that several types of operations, such as addition, multiplication,
the proposed scheme is suitable for big data process- and division. But this framework cannot support multipli-
ing. It can be applied in any scenarios with either a cation of a large number of data.
small or a large number of data providers. Besides the problems mentioned above, the biggest prob-
The rest of this paper is organized as follows. Section 2 lem of PHE is that it is a single-user system. This means that
gives a brief overview of related work. Section 3 introduces the data processing result based on PHE can only be
the system model and attack model of our proposed decrypted and accessed by the user with the corresponding
scheme, followed by its detailed design in Section 4. In secret key of PHE. PHE is not flexible to directly support
Section 5, security analysis and performance evaluation are multi-user access.
given. Finally, a conclusion is presented in the last section.
2.3 Secure Data Access Control
2 RELATED WORK Cloud storage enables cloud users to upload their data to
With the development of cloud computing, cloud users the cloud for storage and further sharing. However, this
benefit from outsourcing data storage and computation to causes a new problem that the cloud users lose full control
the cloud. However, the risk of personal data disclosure over their data. Thus, an efficient and secure data access
makes it urgent to enhance data security and user privacy. control scheme is needed. A number of solutions have been
Besides those schemes focusing on data aggregation [19], proposed to protect the outsourced data in the cloud, as
[20], [21], [22], [23], [24], [25], other studies were conducted briefly introduced below.
to achieve more efficient privacy-preserving operations. In Proxy re-encryption was adopted to manage data sharing
addition, many constructions have been proposed to realize in cloud [33], [34]. But it cannot support fine-grained access
secure access control although the aforementioned issues control on homomorphic computation results. Role-based
are still open. access control (RBAC) can only provide partial flexibility
based on one level policy, which ensures that only the user
2.1 Secure Data Processing Based on SMC with a specified role can access data. But, the constructions
Secure multi-party computation (SMC) enables computa- [35], [36] based on RBAC cannot support flexible access pol-
tions over multi-user outsourced data without revealing icies described with various attribute structures. ABE [37],
DING ET AL.: PRIVACY-PRESERVING DATA PROCESSING WITH FLEXIBLE ACCESS CONTROL 365

5) Authority is fully trusted, which is responsible for


system parameter generation and ABE key issuing.
The DPs provide their personal data in an encrypted
form and store them at the DSP. Then the DSP cooperates
with the CP to complete basic computations over the col-
lected data. In addition, the DSP and CP together execute
the access control over the final result of data processing.
Only those DRs that satisfy a specific policy can access the
final result with the key issued by Authority.

3.2 Attack Model


In the above system, the Authority is regarded as fully
trusted to perform its duties, which acts honestly and would
never collude with any other entities. All other entities are
curious-but-honest. That is, they are curious about others’
Fig. 1. A system model. data, but act honestly by strictly following the design of the
system. The DSP and the CP would never collude with each
[38] was widely applied in cloud storage management for other due to conflict of business interests (e.g., consumer
achieving fine-grained access control [39], [40], [41]. Fur- resources and market division) and their legal responsibil-
thermore, trust-based schemes [15], [16], [17] simplify the ity. Any their collusion will make them lose reputation,
attributes involved in ABE and take into consideration only which finally impacts their profits. Herein, we introduce an
trust levels. These schemes highly reduce computational adversary A in our model, which aims to obtain some spe-
costs. But, only one system entity (such as one user or one cific data by challenging a cloud user (either a DR or a DP)
server) is in charge of the access control, which makes this with following capabilities:
entity obviously knows the contents of results. Thus, it can-
not satisfy the demand that the final result cannot be 1) A may eavesdrop all communication channels to
accessed by any unauthorized entity including servers. In access any encrypted data except the channels
this paper, we propose a scheme by taking advantage of the between Authority and DRs;
homomorphism of ABE under the same policy to control 2) A may compromise the DSP (or the CP) to guess the
the access of the processing result of encrypted data based raw data of all ciphertexts outsourced from the DPs,
on the cooperation of two servers. and the raw data of all ciphertexts sent to the CP (or
the DSP) and the DR;
3 PROBLEM STATEMENTS 3) A may compromise the DSP (or the CP) together
with the DPs to guess the final data processing result.
3.1 System Model 4) A may compromise the DSP (or the CP) together
Our proposed system mainly comprises five types of enti- with the DR to guess the raw data from the DP.
ties as shown in Fig. 1: The attack model has one restriction: A cannot compro-
1) Data service provider (DSP) stores user data, provides mise the challenged DR or DP. The adversary would like to
some computation service and controls user access. know the raw data of DP (by attacking the DP) or the proc-
DSP can be operated by a public cloud provider. essing result (by attacking the DR).
2) Computation party (CP) bears the responsibility of
computations and access control. It can be served by 4 PRIVACY-PRESERVING DATA PROCESSING WITH
a private cloud service provider or an administrative ACCESS CONTROL
department of a company or an institute, which ful- 4.1 Notations and Preliminaries
fills partial computations and controls access. There
4.1.1 Notations
may exist multiple CPs for different applications.
Each CP provides services for its own consumers. For easy presentation, Table 1 summarizes the notations
Herein, we simplify our design by considering only used in this paper.
one CP in this paper.
3) Data providers (DPs) are the data collectors or pro- 4.1.2 Additive Homomorphic Encryption
ducers that encrypt data and store ciphertexts in the Paillier’s cryptosystem [42] is one of the most important
DSP for storage and processing. additive homomorphic encryption. Suppose we have N
4) Data requesters (DRs) are the data consumers that pieces of encrypted data under same key pk, which can be
acquire the result of data processing/analyzing in a presented as ½mi pk ði ¼ 1; 2; . . . ; NÞ. The additive homo-
specific context. A DR can also be a DP. DRs are morphic encryption satisfies the following equation:
cloud users that take advantage of cloud computing
in terms of data storage and data computation. Since YN  XN
the provided data are encrypted, the data processing Dsk i¼1
½mi pk ¼ i¼1
mi ;
result is also in an encrypted form. This raises the
issue of data access control with regard to the proc- where Dsk ðÞ is the corresponding homomorphic decryption
essing results of encrypted data. algorithm with secret key sk.
366 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 17, NO. 2, MARCH/APRIL 2020

TABLE 1 result to any involved entities. Refer to Section 5.2.3 for


Notation Description more details.
Symbols Description
4.2 Homomorphic Re-Encryption Scheme (HRES)
g The system generator that is public;
In order to support privacy-preserving data processing, we
n The system parameter;
ðskDSP ; pkDSP Þ The key pair of DSP for data processing; revise the scheme [43] (named as EDD) and design the
ðskCP ; pkCP Þ The key pair of CP for data processing; HRES to provide two-level decryption and achieve secure
PK ¼ pkDSP skCP The public parameter based on keys of DSP data processing. The complete version of HRES is intro-
¼ pkCP skDSP and CP; duced in our previous work [18].
mi The raw data provided by DP i; Key Generation (KeyGen
KeyGen). Let k be a security parameter
½m The ciphertext of m under PK; and p, q be two large primes, where LðpÞ ¼ LðqÞ ¼ k (LðÞ
½mpki The ciphertext of m under public key pki ;
returns the bit length of input data). Due to the property of
m^ The masked message of m;
f The sign flag in Sign Acquisition, Comparison, and safe primes, there exist two primes p0 and q0 which satisfy
Equality Test; that p ¼ 2p0 þ 1, q ¼ 2q0 þ 1. We compute n ¼ pq and
r The random value; choose a generator g with order  ¼ 2p0 q0 , which can be cho-
N The number of data providers; sen by selecting a random number z 2 Zn2 and computing
LðÞ The bit length of input data; g ¼ z2n . The value  can be used to decrypt the encrypted
ðck; pkck Þ The key pair for final access control;
data, but we choose to conceal it and protect it from all
CK 0 The ciphertext of ck using ABE;
ck1 The partial key for access control chosen by DSP;
involved parties. In the HRES, we only use key pair ðsk; gsk Þ
ck2 The partial key for access control chosen by CP; for data encryption and decryption. The DSP and the CP
MSK 0 The master secret key in ABE; generate their key pairs:ðskDSP ¼ a; pkDSP ¼ ga Þ and
SK 0 The decryption key in ABE; ðskCP ¼ b; pkCP ¼ gb Þ, and then negotiate their Diffie-Hell-
PK 0 The public key in ABE man key PK ¼ pkDSP skCP ¼ pkCP skDSP ¼ gab . To support
encrypted data processing, PK is public to all involved par-
ties. At system setup, cloud user i (i.e., DP or DR) generates
4.1.3 Key-Policy Attribute-Based Encryption (KP-ABE) its key pair ðski ; pki Þ ¼ ðki ; gki Þ. The public system parame-
In KP-ABE, ciphertexts are generated based on some ters include fg; n; PKg.
descriptive attributes while decryption keys are associated First, the original encryption is directly obtained from
with policies. Generally, KP-ABE [38] consists of four algo- [43], which is a general public key cryptosystem.
rithms: Setup, Encrypt, KeyGen, and Decrypt. Encryption (Enc
Enc). Any entity (e.g., cloud user or cloud
SetupABE ð; UÞ ! ðPK 0 ; MSK 0 Þ. The setup algorithm server) wants to send its data to a specific cloud user i. It sim-
takes in security parameter  and attribute universe descrip- ply encrypts its data with the pubic key of cloud user i (pki )
tion U ¼ f1; 2; . . . ; vg. It outputs public paramters PK 0 and random r 2 ½1; n=4, and sends ciphertext to cloud user i:
(T1 ¼ gt1 ; . . . ; TjUj ¼ gtjUj ; Y ¼ eðg0 ; g0 Þy ) and master secret  
½mpki ¼ fð1 þ m  nÞpki r ; gr g mod n2 :
key MSK 0 ðt1 ; . . . ; tjUj ; yÞ, where g0 is the generator of G1
with e : G1  G1 ! GT . Decryption (Dec
Dec). Upon receiving the encrypted data,
EncABE ðM; g; PK 0 Þ ! CK 0 . The encryption algorithm cloud user i can directly decrypt it to obtain the original
takes in message M, a set of attributes g and PK 0 . It outputs data:  
ciphertext CK 0 ðg; E 0 ¼ MY s ; fEi ¼ Ti s gi2g Þ, where s is a m ¼ L ð1 þ m  nÞpki r =ðgr Þki mod n2 :
randomly chosen number.
KeyGenABE ðT ; MSK 0 Þ ! SK 0 . The key generation algo- Second, a Two-Level Decryption scheme is newly designed
rithm takes in access structure T , the master secret key to flexibly support outsourced data processing, as presented
MSK 0 . It outputs decryption key SK 0 (SK 0i ¼ g0qx ð0Þ=ti where below:
i ¼ attðxÞ, qx ð0Þ ¼ qparentðxÞ ðindexðxÞÞ) and qr ð0Þ ¼ y. Encryption with Two Keys (EncTK EncTK). Given message
DecABE ðCK 0 ; PK 0 ; SK 0 Þ ! M. The decryption algo- mi 2 Zn provided by cloud user i, we first select random
rithm takes in PK 0 , SK 0 and the ciphertext CK 0 . If the set of number r 2 ½1; n=4 and then encrypt it with PK generated
attributes satisfies the access policy tree T embedded in the from the keys of two servers. The ciphertext is generated as
private key, it finally outputs the message M. ½mi  ¼ ½mi PK ¼ fTi ; Ti 0 g, where Ti ¼ ð1 þ mi nÞPK r mod n2
For more details about KP-ABE, refer to [38]. Notably, and Ti0 ¼ gr mod n2 .
ciphertext-policy attribute-based encryption (CP-ABE) [37] Note: for ease of presentation, we use ½mi  to denote the
ciphertext of mi encrypted with PK, which can only be
can also be applied to implement our scheme. The KP-ABE
decrypted under the cooperation of DSP and CP.
is multiplicative homomorphic if the same attributes are
Partial Decryption with S K DSP (PDec PDec1). Once ½mi  is
employed to encrypt two pieces of raw data. That is, given
received by the DSP, algorithm PDec PDec1 will be run to transfer
two ABE ciphertexts of M1 and M2 under the same policy,
it into another ciphertext that can be decrypted by the CP as
the ciphertext of M1 M2 can be obtained through the multi-
follows:
plication of two ciphertexts EncABE ðM1 ; g; PK 0 ÞEncABE n o n o
ðM2 ; g; PK 0 Þ, marked as HE ABE . The length of raw data is ½mi pkCP ¼ Ti ð1Þ ; Ti 0ð1Þ ¼ Ti ; ðTi 0 Þ DSP
sk

limited and highly related to the system parameters. In


this paper, we employ this feature to realize the secure ¼ fð1 þ mi  nÞPK r ; gra g mod n2
access control that can prevent the reveal of processing ¼ fð1 þ mi  nÞpkCP ar ; gra g mod n2 :
DING ET AL.: PRIVACY-PRESERVING DATA PROCESSING WITH FLEXIBLE ACCESS CONTROL 367

operations and are given in the next sub-section. In addi-


tion, CP chooses a random partial key ck1 for access control,
which will be used in Step 5.
Step 4 (Data Process @ CP). Upon receiving the pre-proc-
essing results from the DSP, the CP chooses another random
partial key ck2 and further processes data to obtain the pre-
^
^ pkck or ½f
processing result ½m
2
pkck .
2

Regarding to access control, CP encrypts ck2 using ABE


to get CK20 ¼ EncABE ðck2 ; g; PK 0 Þ and forwards it to DSP.
Step 5 (Additional Process @ DSP). The DSP needs to fur-
ther remove the mask from ciphertext ½m ^
^ pkck or ½f
2
ck2 to
obtain the final processing ciphertext ½mpkck or ½fpkck where
pkck ¼ gck ¼ gck1 ck2 and ck ¼ ck1 ck2 .
Regarding to access control, the DSP encrypts ck1 using
ABE under the same policy to get CK10 and further gets CK 0
through the homomorphism of ABE:
Fig. 2. A brief procedure of data processing. CK 0 ¼ CK10  CK20 ¼ EncABE ðck1  ck2 ; g; PK 0 Þ:

Partial Decryption with S K CP (PDec PDec2). Once the Finally, the DSP keeps ½mpkck or ½fpkck , and CK 0 for user
encrypted data ½mi pkCP is received, the CP can directly access.
decrypt it with its own secret key as follows: Step 6 (Data Access @ DR). If the DR satisfies the access
policy, Authority issues a secret key SK 0 to the DR. Hence,
1) Ti 0ð2Þ ¼ ðTi 0ð1Þ ÞskCP ¼ grab ¼ PK r mod n2 ; the DR can decrypt CK 0 to get ck, and further obtain m or f
2) mi ¼ LðTi ð1Þ =Ti 0ð2Þ mod n2 Þ, where LðuÞ ¼ ðu  1Þ=n. to meet their computation demand.
In addition, the encrypted data under any public key pk
has the following properties: 4.4 Detailed Data Processing
1) Additive homomorphism: System setup and data collection are the same as those in
½m1 pk  ½m2 pk ¼ ½m1 þ m2 pk ; Section 4.3. The operations for access control are also the
2) ð½mpk Þt ¼ ffð1 þ mnÞpkr gt ; ðgr Þt g mod n2 same as those above, thus we do not introduce the details in
this section.
¼ fð1 þ m  nÞt pkrt ; grt g mod n2
Our proposed scheme supports seven basic operations
¼ fð1 þ t  m  nÞpkrt ; grt g mod n2
over encrypted data: 1) Addition; 2) Subtraction; 3) Multiplica-
¼ ½t  mpk ;
tion; 4) Sign Acquisition; 5) Absolute; 6) Comparison; and 7)
3) ð½mpk Þn1 ¼ ffð1 þ m  nÞpkr gðn1Þ ; ðgr Þðn1Þ g mod n2 Equality Test. In the following sub-sections, we mainly focus
¼ fð1 þ m  ðn  1Þ  nÞpkrðn1Þ ; grðn1Þ g mod n2 on the steps from 3 to 5 in each basic operation.
¼ fð1  m  n þ m  n2 Þpkrðn1Þ ; grðn1Þ g mod n2
¼ fð1  m  nÞpkrðn1Þ ; grðn1Þ g mod n2 4.4.1 Addition
P
¼ ½mpk : Addition obtains the sum of all raw data: m ¼ N i¼1 mi ,
which can be accomplished by multiplying all ciphertexts.
4.3 Data Processing Procedure Note that the number of the data in Addition affects the
The brief procedure of data processing is shown in Fig. 2. It length of the provided data. If we want to get the sum result
mainly involves six steps: of N pieces of data, it should guarantee that mi < n=N.
Step 1 (System Setup @ All Entities). Authority calls the Step 3 (Data Preparation @ DSP). Due to additive homo-
algorithm KeyGen in Section 4.2 and SetupABE ð; UÞ in morphism, the DSP can directly multiply encrypted data
Section 4.1.3 to complete the setup of HRES and ABE. Note: one by one as follows:
if multiple CPs are employed in the system, each CP can YN YN YN 
negotiate a Diffie-Hellman key PK with the DSP and pub- ½m ¼ ðT; T 0 Þ ¼ i¼1
½mi  ¼ T
i¼1 i
; i¼1
Ti
0

lish this key to its customers.


Step 2 (Data Upload @ DPs). DPs encrypt their personal To realize group access control, it chooses a random
data before uploading it to the DSP. It directly recalls number r1 and the first partial key ck1 , and then computes
EncTK to encrypt data mi (Unless otherwise specified, as follows:
jmi j < LðnÞ=4):
1) Compute c1 ¼ ck1 1 mod n2 ;
  2) Mask ciphertext:
½mi  ¼ Ti ; Ti0 ¼ fð1 þ mi  nÞ  PK ri ; gri gmod n2 :
  
c 
½c1 ðm þ r1 Þ ¼ T~; Te0 ¼ ðT ð1 þ r1  nÞÞc1 ; ðT 0 Þ 1
Step 3 (Data Preparation @ DSP). Upon receiving the data
from DPs, the DSP needs to do some analyses over the
3) Call PDec
PDec1 to partially decrypt it:
encrypted data. It pre-processes the data and provides a   n  a o
data packet DPacket and ABE ciphertext for access control ½c1 ðm þ r1 ÞpkCP ¼ T^; Tb0 ¼ T~; Te0
to the CP. The details of this process differ in various
368 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 17, NO. 2, MARCH/APRIL 2020

c a
Then DSP sends ½c1 ðm þ r1 ÞpkCP to the CP. 4) ½c2  m2 pkCP ¼ ðT2 ð1Þ ; T2 0ð1Þ Þ ¼ fT2 c2 ; ðT2 0 Þ 2 g ¼ fð1 þ c2 
r2 c2 r2 ac2
Step 4 (Data Process @ CP). The CP calls the algorithm m2  nÞ  PK ; g g.
PDec2 with skCP to finally decrypt the encrypted data and
PDec The data packet sent to the CP is {½c1 m1 pkCP ;
obtain c1 ðm þ r1 Þ. And then the CP chooses the second partial ½c2  m2 pkCP }.
key ck2 and a random number r to encrypt data as follows: Step 4 (Data Process @ CP). Upon receiving the data
   
½c1 ðm þ r1 Þ ¼ T; T 0 ¼ ð1 þ c1 ðm þ r1 ÞnÞgck2 r ; gr
pkck2
packet from the DSP, the CP uses the algorithm PDec PDec2 to
decrypt the data:
where pkck2 ¼ gck2 .  b  b
Then the CP encrypts ck2 to obtain CK20 and forwards c1  m1 ¼ T1 ð1Þ = T1 0ð1Þ ; c2  m2 ¼ T2 ð1Þ = T2 0ð1Þ :
^ pkck and CK20 back to the DSP.
½m
It then chooses ck2 and a random number r, and encrypts
Step 5 (Additional Process @ DSP). The DSP computes to
c1  m1  c2  m2 and ck2 as follows:
obtain the final encrypted processing result with ck1 and r1 :
    1) ^ pkck ¼ ½c1 c2 mpkck ¼ ðT; T 0 Þ ¼ fð1 þ c1 m1 c2 m2  nÞ
½m
½mpkck ¼ T 1 ð1  r1 nÞ; T 0 ¼ ð1 þ m  nÞgck1 ck2 r ; gr
ck
2 2
gck2 r ; gr g;
where pkck ¼ gck1 ck2 and ck ¼ ck1 ck2 . 2) CK20 ¼ EncABE ðck2 ; g; PK 0 Þ.
Similar to Section 4.3, it encrypts ck1 using ABE and gets Finally, the CP forwards ½m ^ pkck and CK20 to the DSP.
2
CK 0 ¼ CK10  CK20 ¼ EncABE ðck1  ck2 ; g; PK 0 Þ. Step 5 (Additional Process @ DSP). The DSP further pro-
cesses the data packet with ck1 and then gets ciphertext of
4.4.2 Subtraction key as follows:
Subtraction Pobtains the subtraction of some data ðm ¼
P 1) ½mpkck ¼ fT 1 ; T 0 g ¼ fð1 þ m  nÞgck1 ck2 r ; gr };
ck
W N
i¼1 mi  i¼W mi Þ with encrypted data ½mi ði ¼ 1; . . . ; NÞ.
It can be accomplished by negating the subtracted terms (by 2) CK 0 ¼ CK20  EncABE ðck1 ; g; PK 0 Þ.
raising to the power of ðn  1Þ), then following the proce-
dure of Addition. 4.4.4 Sign Acquisition
We assume that LðmÞ < LðnÞ=4 and BIG is the largest raw
PStep 3 (Data QWPreparation @ DSP).
PN The DSPQfirst computes
½ W i¼1 mi  ¼ i¼1 ½mi  and ½ i¼W þ1 m i  ¼ N
i¼W þ1 ½mi . It
data of m. Then the raw data is in the scope ½BIG; BIG.
PN PN DR wants to know the sign of raw data m1 from ½m1 . Sign
further calculates ½ i¼W þ1 mi  ¼ ð½ i¼W þ1 mi Þn1 and
P PN Acquisition can be achieved by masking the original cipher-
multiplies them to obtain: ½m ¼ ½ð W i¼1 mi  i¼W þ1 mi Þ ¼ texts with random numbers of limited length and then
PW PN
½ i¼1 mi   ½ i¼W þ1 mi . Then the subsequent process is checking the length of the masked data to further determine
the same to that in Addition. Due to length and simplicity the real length of original data. Here, the DR targets to
reasons, we skip its details. obtain the final sign indicator f from ½m1 .
Step 3 (Data Preparation @ DSP). The DSP chooses three
4.4.3 Multiplication random numbers R (LðRÞ < LðnÞ=4Þ, c1 and ck1 . It first
Multiplication obtains the product of all raw data encrypts “1” and then computes as follows:
Q
(m ¼ N i¼1 mi Þ. Multiplication is a bit more complicated 1)
0
½1 ¼ fð1 þ nÞ PK r ; gr g;
0

than Addition. It can be accomplished with three steps: 1)


2) ½2m1 þ 1 ¼ ðT; T 0 Þ ¼ ½m1 2 ½1 ¼ fð1 þ ð2m1 þ 1Þ
mask the raw data by raising to the power of a random 0 0
number c; 2) decrypt all masked ciphertexts, multiply them nÞPK r þ2r1 ; gr þ2r1 g;
in the form of plaintexts and then re-encrypt masked result; 3) Then it flips a coin s. If s ¼ 1; it computes:
3) encrypt masked multiplication result and then remove n o
aðnRÞ
the mask. For ease of presentation, we describe the details ½m0 pkCP ¼ T nR ; ðT 0 Þ ¼ ½Rð2m1 þ 1Þ:
with two pieces of data (½m1 , ½m2 ). The DR wants to get the
multiplication result m ¼ m1  m2 . 4) Otherwise (s ¼ 1), it calls PDec PDec1 and computes:
Note that the available number of the data in multiplica- ½m0 pkCP ¼ fT R ; T 0aR g ¼ ½Rð2  m1 þ 1Þ.
tion influences the length of original raw data. If we need to 5) The DSP computes c2 ¼ ðck1 Þ1 mod n, and s0 ¼
get the product of N pieces of data, it must be guaranteed c1  c2  s mod n.
that Lðmi Þ < LðnÞ=ð2NÞ, which is different from Addition. The data packet sent to the CP is {½m0 pkCP ; s0 }.
Step 3 (Data Preparation @ DSP). First, the DSP chooses a Step 4 (Data Process @ CP). Upon receiving the data
random partial key ck1 and a random number c1 , and sets packet from the DSP, the CP decrypts ½m0 pkCP with PDec PDec2
another one as c2 ¼ ðck1  c1 Þ 1 mod n. to obtain raw data m0 .
To conceal each raw data from the CP, the DSP does one The CP compares Lðm0 Þ with LðnÞ=2. If Lðm0 Þ < LðnÞ=2,
exponentiation and one decryption with its own secret key it sets u ¼ 1; otherwise, u ¼ 1.
by calling PDec
PDec1: The CP chooses a random number r and a second partial
key ck2 , and further computes as follows:
½c1  m1  ¼ fT1 c1 ; ðT1 0 Þ 1 g;
c
1)
c a ^
½f  0 0 ck2 r r
2) ½c1  m1 pkCP ¼ ðT1 ð1Þ ; T1 0ð1Þ Þ ¼ fT1 c1 ; ðT1 0 Þ 1 g ¼ 1) pkck2 ¼ ðT ; T Þ ¼ fð1 þ s unÞg ; g g;
fð1 þ c1  m1  nÞ  PK r1 c1 ; gr1 ac1 g; 2) Encrypt ck2 using ABE: CK2 ¼ EncABE ðck2 ; g; PK 0 Þ.
0

3) ½c2  m2  ¼ fT2 c2 ; ðT2 0 Þ 2 g;


c
Finally, the CP forwards ½f ^ to DSP.
pkck2
DING ET AL.: PRIVACY-PRESERVING DATA PROCESSING WITH FLEXIBLE ACCESS CONTROL 369

Step 5 (Additional Process @ DSP). The DSP further pro- the data packet ½sum1 pkck to the DR in a secure way. Then
cesses the data packet as follows: the DR can decrypt it to obtain su  m1 .
1) Compute c3 ¼ c1 1 mod n; Note: if m1  0, su ¼ 1; Otherwise, su ¼ 1. Hence,
2)
ck c
½fpkck ¼ fT 1 3 ; ðT 0 Þ 3 g ¼ fð1 þ su
c su  m is the absolute of data m.
nÞgck1 ck2 rc3 ; grc3 g. 4.4.6 Comparison
3) CK 0 ¼ EncABE ðck1 ; g; PK 0 Þ  CK20 . Comparison can be simply accomplished by checking the
Step 6 (Data Access @ DR). The DR satisfying the access sign of the difference value of two data by calling Sign
policy in ABE can decrypt CK 0 to obtain ck and further Acquisition. Similar to the functions above, DR wants to
decrypt ½fpkck to obtain f. compare the raw data ðm1 ; m2 Þ based on their encrypted
Note: if f ¼ 1, m1  0; Otherwise, m1 < 0. data. For ease of presentation, m1  m2 is denoted as m12 .
½m1  ¼ ðT1 ; T1 0 Þ ¼ fð1 þ m1  nÞ  PK r1 ; gr1 g
4.4.5 Absolute
½m2  ¼ ðT2 ; T2 0 Þ ¼ fð1 þ m2  nÞ  PK r2 ; gr2 g
Besides the operations in Sign Acquisition, Absolute needs to
mask the original data by raising to the power of a random Step 3 (Data Preparation @ DSP). DSP first computes to get
number, and then remove the mask according to sign indi- the subtraction of encrypted data:
cator to achieve a final absolute result. We assume that n o
ðT; T 0 Þ ¼ T1  ðT2 Þn1 ; T1 0  ðT2 0 Þ
n1
¼ ½ðm1  m2 Þ:
LðmÞ < LðnÞ=4 and that BIG is the largest raw data of m.
Then the raw data is in the scope ½BIG; BIG. Here, given The following steps are the same as those in Sign Acquisi-
ciphertext ½m1 , DR wants to get the absolute value jm1 j. tion, which are skipped for the reason of paper length limi-
Step 3 (Data Preparation @ DSP). The DSP chooses three tation. Through the cooperation of the DSP and the CP, the
random numbers R where LðRÞ < LðnÞ=4, c1 and c2 , and DR finally gets the sign of m12 ¼ m1  m2 . In the end, the
also chooses the first partial key ck1 . It first encrypts “1” and DR can obtain the comparison result. If m12  0, m1  m2 ;
then computes as follows: otherwise, m1 < m2 .
0 0
1) ½1 ¼ fð1 þ nÞ PK r ; gr g;
4.4.7 Equality Test
2) ½2  m1 þ 1 ¼ ðT; T 0 Þ ¼ ½m1 2  ½1 ¼
0 0 Equality Test needs to check the signs of both difference
fð1 þ ð2  m1 þ 1Þ  nÞ  PK r þ2r1 ; gr þ2r1 g;
value and negative difference value of original two data by
3) Then it flips a coin s. If s ¼ 1; it computes:
calling Comparison twice. DR wants to know whether m1 is
n o
½m0 pkCP ¼ T nR ; ðT 0 Þ
aðnRÞ
¼ ½R  ð2  m1 þ 1Þ equal to m2 or not from the encrypted data (½m1 , ½m2 ). The
DSP and the CP directly interact with each other in two par-
allel computations of Comparison.
Otherwise (s ¼ 1), it calls PDec PDec1 and computes:
They compare m1 and m2 in two forms: 1) m12 ¼
½m0 pkCP ¼ fT R ; T 0aR g ¼ ½R  ð2  m1 þ 1Þ;
m1  m2 ; 2) m21 ¼ m2  m1 . Through the operations in
4) Compute ½c1 m1  ¼ ½m1 c1 , and call PDec
PDec1 to obtain Comparison, DSP can get two results ½f1 pkck and ½f2 pkck ,
½c1 m1 pkCP . respectively. Then the DSP can obtain ½fpkck ¼½f1 þ f2 pkck ¼
5) The DSP sets c3 ¼ ðck1 Þ1 mod n, and s0 ¼ c2  c3  s ½f1 pkck  ½f2 pkck .
mod n. Finally, the DR that satisfies the access policy in ABE can
The data packet sent to the CP is {½m0 pkCP ; s0 ; ½c1 m1 pkCP }. decrypt CK 0 to obtain ck. The DSP sends the data packet
Step 4 (Data Process @ CP). Upon receiving the data ½fpkck to the DR in a secure way. Then the DR can further
packet from the DSP, the CP decrypts ½c1 m1 pkCP and decrypt ½fpkck to obtain f.
½m0 pkCP with PDec
PDec2 to obtain c1 m1 and m0 , respectively. The Note: if f ¼ 2, m1 ¼ m2 ; Otherwise, m1 6¼ m2 .
CP compares Lðm0 Þ with LðnÞ=2. If Lðm0 Þ < LðnÞ=2, it sets 4.5 Data Analysis over Fixed Point Numbers
u ¼ 1; otherwise, u ¼ 1. In order to adapt to various applications, we further design
Then CP chooses r and the second partial key ck2 , and a scheme to deal with fixed point numbers rather than
further computes as follows: integers.
1) ½c1 m1 s0 upkck ¼ ðT; T 0 Þ ¼ fð1 þ c1 m1 s0 u  nÞgck2 r ; gr g; Normally, a fixed-point number can be represented with
2 three parts: the sign field, integer field and fractional field.
2) Encrypt ck2 using ABE: CK20 ¼ EncABE ðck2 ; g; PK 0 Þ.
Given a fixed point number m, we set it in binary format as
Finally, the CP forwards ½c1 m1 s0 upkck and CK20 to DSP. ðS; be2 ; be3 ; . . . ; b0 ; b1 ; . . . ; bf Þ, where S is its sign, e  1 is
2
Step 5 (Additional Process @ DSP). The DSP further pro- the length of the integer field, f isPthe length of the fractional
cesses the data packet as follows: field and its value is m ¼ S  e2 i¼f ðbi  2 Þ. In order to
i

encrypt number m, we should first scale jmj to


1) Set c4 ¼ ðc1 Þ1 mod n and c5 ¼ ðc2 Þ1 mod n;
ck c c c c
jm0 j ¼ jmj  2f . If m is a positive value, then we can set
2) ½sum1 pkck ¼ fT 1 4 5 ; T 0 4 5 g ¼ fð1 þ su  m1  nÞ m0 ¼ m  2f ; otherwise, we should set m0 ¼ N  m  2f .
ck1 ck2 rc4 c5 rc4 c5
g ; g g; Then m0 as an integer can be encrypted as ½m0 .
3) CK 0 ¼ EncABE ðck1 ; g; PK 0 ÞCK20 . Regarding to the operations presented in Section 4.4
Step 6 (Data Access @ DR). The DR that satisfies the access except multiplication, it is easy to be executed over fixed
policy in ABE can decrypt CK 0 to obtain ck. The DSP sends point numbers.
370 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 17, NO. 2, MARCH/APRIL 2020

4.5.1 Multiplication over Encrypted Fixed SimDP receives the input of m1 and m2 , then it simulates
Point Numbers ADP as follows: it encrypts data m1 as ½m1  ¼ EncTKðm1 Þ,
For two fixed point numbers m1 and m2 , we perform as and data m2 as ½m2  ¼ EncTKðm2 Þ. Finally, it returns ½m1 
follows: and ½m2  to ADP , and outputs the entire view of ADP .
The view of ADP is the encrypted data. The views of ADP
1) Get the integer representation of m1 and m2 : in the real and the ideal executions are indistinguishable.
m01 ¼ m1  2f and m02 ¼ m2  2f ; SimDSP simulates ADSP as follows: it runs the EncTK on
2) Users upload their ciphertext to CSP as: ½m01  and two randomly chosen numbers m f1 and m f2 ; then it multiplies
½m02 . f1  by ½m
½m f2  to get ½m
~ where m ¼ m f1 þ m f2 ; further it masks
3) Then execute Multiplication over ½m01  and ½m02 ; the ciphertext with two random numbers r1 and ck1 , and runs
4) Finally, DR can get the value of m01  m02 , then scale ~ þ r1 ÞpkCP . By accessing SimCP , it
PDec1 to obtain ½c1 ðm
the PDec
down to obtain the final result m1  m2 ¼ m01  m02  2f . b~
receives ½m and CKg0 $ based on a randomly generated
pkck2 2
key ck2 . Then it computes to obtain ½m ~ pkck and CKg0 . Finally,
4.5.2 Polynomial Computations over Encrypted Fixed b~ g 0
SimDSP outputs ½c1 ðm ~ þ r1 ÞpkCP , ½m ~ pkck and
pkck2 , CK2 , ½m
Point Numbers
g 0
CK to ADSP . If ADSP replies with ?, SimDSP returns ?.
For a clear presentation, we give an example of m1  m2 þ m3 .
The view of ADSP consists of the encrypted data and the
The detailed procedure is presented as follows:
ciphertext of corresponding decryption key. Owing to the
1) (@DPs) Get the integer representation of three num- honesty of the challenged cloud user and the security of
bers: m01 ¼ m1  2f , m02 ¼ m2  2f and m03 ¼ m3  2f ; the HRES, ADSP receives the same output in both real and
2) (@DSP) Execute the same operations to the Step 3 in ideal executions. As the decryption key ck is randomly con-
Multiplication to get: {½c1  m01 pkCP ; ½c2  m02 pkCP g. structed by CSP and CP in each challenge, ADSP would not
3) (@CP) Decrypt data packet to get c1 m01 and c2 m02 ; obtain more information by executing multiple challenges.
Then encrypt c1  m01  c2  m02 with Diffie-Hellman Thus, the views are indistinguishable.
key PK to get ½c1 c2  m01 m02 ; Send it to DSP. SimCP simulates ACP as follows: it randomly chooses
f
4) (@DSP) First compute ½m03 2 to scale the original data data m,^ uses Enc to obtain ½m ^ pkck and calls ABE encryption
2
0
and get ½2  m3 ; Execute the proposed scheme
f d 0
to obtain CK2 . Then it sends ½m ^ pkck and CK d0 to ACP . If ACP
2
2
Addition over ½2f  m03  and ½c1 c2  m01 m02  under the replies with ?, SimCP returns ?. In both real and ideal exe-
cooperation with CP. cutions, it receives the output of two ciphertexts. In the real
Note: The length of data encrypted via Paillier system is world, the security is guaranteed by the semantic security
less than LðnÞ. In order to support various computations of HRES and the security of ABE.
above over positive and negative numbers, we strictly SimDR simulates ADR as follows: (it cannot enquire for
restrict the length of data such that LðmÞ < 1=2  LðnÞ. If the challenged data) it randomly chooses data ½m0 pkck and
multiplication of N pieces of data is needed, then it has a decrypts it to obtain m0 , and then sends it to ADP . If ADP
strict limitation that LðmÞ ¼ ðe þ fÞ < LðnÞ=ð2NÞ. Here, replies with ?, SimDR returns ?.
with the default setting LðnÞ ¼ 1024, e ¼ 45, f ¼ 15, we The view of ADR is the decrypted result without any
should limit the multiplication times (i.e., the number of other information. But in both the real and ideal executions,
provided data) to 8. it is guaranteed by the semantic security of the HRES. The
views are indistinguishable in both executions.
5 SECURITY ANALYSIS AND PERFORMANCE No matter how many times the adversary accesses the
EVALUATION simulator ADR , it is still difficult to obtain the original real
5.1 Security Analysis data for two reasons: 1) the randomly chosen data have no
relation to the original real data; 2) exhaustion attack is hard
The semantic security of HRES has been proved in our pre-
owing to the randomness of the chosen numbers.
vious work [18]. Hence, we skip its security proof and focus
The security proofs of other operations are similar to that
on the security analysis of our proposed schemes. Here, we
of the Addition under the semi-honest (non-colluding)
adopt the security model for securely realizing an ideal
adversaries A ¼ ðADR ; ADSP ; ACP ; ADP ).
functionality in the presence of semi-honest (non-colluding)
adversaries. It involves four types of parties: DSP, CP, DP 5.2 Performance Evaluation
and DR. Thus, we construct four simulators Sim ¼ ðSimDP ; In this section, we analyze the computational complexity
SimDSP ; SimCP ; SimDR Þ to against four kinds of adversaries and the communication overhead of our proposed seven
(ADP ; ADSP ; ACP ; ADR ) that corrupt DP , DSP , CP and DR, computing operation schemes. Further, we implemented
respectively. them and tested their performances through simulations.
Theorem 1. The Addition scheme in Section 4.4.1 can securely 5.2.1 Computational Complexity Analysis
obtain the plaintext of addition via computations on ciphertexts
Herein, we analyze the computational complexity of our
in the presence of semi-honest (non-colluding) adversaries
designed schemes. Notably, the ABE and the HRES are
A ¼ ðADR ; ADSP ; ACP ; ADP ).
based on different cryptographic techniques, while the
Proof. We present the construction of four independent sim- computational complexity by employing ABE to control
ulators ðSimDP ; SimDSP ; SimCP ; SimDR Þ. Here, we prove access in each operation is the same. Hence, we analyze the
the security of the case with two inputs (i.e., N ¼ 2). u
t computational complexity of ABE in a separate part.
DING ET AL.: PRIVACY-PRESERVING DATA PROCESSING WITH FLEXIBLE ACCESS CONTROL 371

1) The Computational Complexity of ABE. As presented in exponentiations, and then call PDec1. Moreover, it should do
Section 4.1.3, the computations of all four algorithms are one modular exponentiation for removing the mask in Step 5.
related to the number of attributes. In order to clarify the In Subtraction, the DSP needs to obtain the negative of subtrac-
relationships, we assume that there are jUj universal attrib- tor with two more modular exponentiations than that in Addi-
utes, that jgj attributes are in the access policy tree T , and tion. As the modular exponentiation of gr with r 2 ½1; n needs
that at most # attributes should be satisfied in the policy at most n modular multiplications, the multiplication of N
tree T to decrypt ciphertext. (N < n) pieces of provided data results in computational
The setup algorithm SetupABE ðÞ should choose the system complexity of Oð1Þ. Thus, the DSP has the computational
parameters and generate the public parameters. It needs to complexity of Oð1Þ in both Addition and Subtraction.
do jUj þ 1 exponentiations and one bilinear pairing. The In Multiplication, the DSP should first mask each piece of
encryption algorithm EncABE ðÞ needs to generate the cipher- data with a random number through two exponentiations
text by involving each attribute in T with one exponentiation, and then call PDecPDec1 to partially decrypt the data in Step 3,
and encrypt the original message with one exponentiation. which results in 3N modular exponentiations. In Step 5, it
Hence, the encryption algorithm needs jgj þ 1 exponentia- should do one exponentiation to remove the mask from
tions in total. KeyGenABE ðÞ operates jgj þ 1 exponentiations original data. Hence, the computational complexity of DSP
to generate decryption key. HE ABE ðÞ merely involves jgj þ 1 results in OðNÞ.
multiplications. As exponentiation is significantly more In Sign Acquisition, the DSP needs to do four modular
costly than multiplication, we ignore the computation cost of exponentiations in Step 3, and two more in Step 5. In
HE ABE ðÞ in our anlysis. The main operation in DecABE ðÞ is to Absolute, the DSP needs to do three more modular exponen-
compute the divided pieces of encrypted partial keys, which tiations in Step 3 than it does in Sign Acquisition. In Compari-
performs at most # bilinear pairings. son, the DSP should first get the subtraction of two pieces of
The system setup and data encryption only need to be encrypted data, which needs two modular exponentiations,
executed once. Thus, their computational complexity can be and then do the same operation as it does in Sign Acquisi-
amortized when multiple users access the final result. tion. In Equality Test, the DSP needs invoke the Comparison
Though the computation cost of cloud users in decryption twice. Hence, its computational complexity in these three
algorithm is higher than our previous scheme [18], it enhan- schemes are all Oð1Þ.
ces the security of processing results by introducing fine- Computational Complexity of CP. In the schemes except
grained access control. The system should balance efficiency Multiplication, Absolute and Equality Test, the CP first
and security according to its capabilities and requirements. decrypts ciphertext by calling PDec PDec2 and then encrypts the
Moreover, trust can be used as a single attribute in ABE in data with a partial secret key, which needs three modular
order to greatly reduce computational cost [15], [16], [17]. exponentiations in total. Hence, the computational complex-
2) The Computational Complexity of Data Analysis. As the ities in them are all Oð1Þ regardless of the ABE encryption.
computations related to ABE for access control neither vary In Multiplication, the CP should first decrypt each cipher-
with the number of provided data nor vary with the designed text of masked original data with PDec PDec2, then encrypt their
functions, their costs are ignored in the following analysis. product with Enc Enc. It totally needs ðN þ 2Þ modular exponen-
The modular exponentiation operation is significantly tiation and results in computational complexity OðN þ 2Þ.
more time-consuming than the modular addition and multi- Different from the analysis above, the CP in Absolute
plication, thus we ignore the fixed numbers of additions and should first do two partial decryptions PDec2. Generally, it
multiplications in the following analysis. In addition, the needs four modular exponentiations. Its computational
computational complexity of basic operations (modular complexity results in Oð1Þ.
exponentiation in HRES, exponentiation and bilinear pairing In Equality Test, the CP takes the double computation costs
in ABE) would never be affected by the number of provided in Comparison, which needs six modular exponentiations but
data or access policy. Thus, we set all their computational still results in the computational complexity of Oð1Þ.
complexities to be Oð1Þ. Computational Complexity of DR. The DR should first call
Enc and EncTK need two modular exponentiations. DecABE ðÞ to obtain the decryption key ck. Then, it further
Both the algorithms Dec and PDecPDec2 take one modular expo- decrypts the pre-processing result to obtain the final result
nentiation and one modular multiplication to obtain the by calling Dec
Dec, which needs one modular exponentiation.
ciphertext, and PDec
PDec1 needs one modular exponentiation. 3) The Summary of Computation Analysis in Seven Operation
Based on these analyzed results, we further give the compu- Schemes. In the following tables and figures, we use the foll-
tational complexity in seven operation functions. We hold owing corresponding notations: Addition (Add), Subtraction
the assumption that there are N pieces of provided data in (Sub.), Multiplication (Mul.), Sign Acquisition (Sign), Absolute
Addition, Subtraction, and Multiplication. (Abs.), Comparison (Comp.), and Equality Test (Equal). Here,
Computational Complexity of DP. The DP directly outsour- we present the total computation costs in each algorithm and
ces its data with EncTK for data processing/analyzing. Its compare them with existing work [18] in Table 2. The constant
computation cost of outsourcing one piece of data is two number of multiplications is not considered in the table. We
modular exponentiations, which is with the computational can observe that our new schemes introduce some computa-
complexity Oð1Þ. tion cost to the involved entities, but it can greatly reduce
Computational Complexity of DSP. In Addition, the DSP has the cost of DSP and CP when the number of DRs is high,
two parts of computations in each algorithm. In Step 3, especially in Multiplication, which is further discussed in
the DSP first needs to multiply the N pieces of data, mask Section 5.2.2. Moreover, our scheme provides fine-grained
ciphertexts with random numbers through two modular access control and enhances the security of processing results.
372 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 17, NO. 2, MARCH/APRIL 2020

TABLE 2 TABLE 3
Computation Analysis Communication Overhead of Each Scheme

Role Operation Computations Complexity of Computations Schemes Communication Communication


of our work our work in [18] overhead Overhead in [18]
DP ALL 2  ModExp Oð1Þ 2  ModExp of our work
Add N  ModMul þ OðjgjÞ ðN  ModMulþ Add 8LðnÞ þ ðjgj þ 1ÞLD 8LðnÞNR
4  ModExp þ 3ModExpÞNR Sub. 8LðnÞ þ ðjgj þ 1ÞLD 8LðnÞNR
ðjgj þ 1 ÞExp Mul. 4ðN þ 1ÞLðnÞ þ ðjgj þ 1ÞLD 4ðN þ 3ÞLðnÞNR
Sub. N  ModMul þ OðjgjÞ ðN  ModMul þ Sign 9LðnÞ þ ðjgj þ 1ÞLD 12LðnÞNR
6ModExp þ 5ModExpÞNR Abs. 13LðnÞ þ ðjgj þ 1ÞLD –
ðjgj þ 1 ÞExp Comp. 9LðnÞ þ ðjgj þ 1ÞLD 12LðnÞNR
Mul. ð3N þ 1ÞModExp þ OðN þ jgjÞ NR ð2N þ 2Þ Equal 18LðnÞ þ ðjgj þ 1ÞLD 24LðnÞNR
ðjgj þ 1 ÞExp ModExp Vari. – 4ð2N þ 1ÞLðnÞNR
DSP Sign 6  ModExp þ OðjgjÞ 3NR  ModExp Data Access NR ð4LðnÞ þ ðjgj þ 1ÞLD Þ 4LðnÞNR
ðjgj þ 1 ÞExp
Abs. 9  ModExpþ OðjgjÞ – Note: LD : bit length of elements in ABE; NR : the number of data requesters.
ðjgj þ 1 ÞExp
Comp. 8  ModExp þ OðjgjÞ 4NR  ModExp communication overhead in Multiplication is proportional to
ðjgj þ 1 ÞExp
the number of provided data. But the cost in other schemes
Equal 16  ModExp þ OðjgjÞ 8NR  ModExp
ðjgj þ 1 ÞExp does not vary much as it has only one or two data inputs.
Vari. – – NR ð4N þ 2Þ From the comparisons, we can find that the communication
ModExp cost during data analysis in our new scheme is independent
Add 3  ModExp þ OðjgjÞ 3NR  ModExp of the number of DRs, which saves the cost for multi-user
ðjgj þ 1 ÞExp access. In general, the communication cost is reasonable
Sub. 3  ModExp þ OðjgjÞ 3NR  ModExp and our schemes are suitable for various applications.
ðjgj þ 1 ÞExp
Mul. ðN þ 2ÞModExpþ OðN þ jgjÞ NR ðN þ 2Þ 
ðjgj þ 1 ÞExp ModExp 5.2.3 Experimental Results
Sign 3  ModExp þ OðjgjÞ 3NR  ModExp The efficiency of HRES has been presented in [18]. Hence, we
ðjgj þ 1 ÞExp focused on the performance evaluation of the proposed seven
CP Abs. 4  ModExp þ OðjgjÞ –
operation schemes. We implemented the proposed seven
ðjgj þ 1 ÞExp
Comp. 3  ModExp þ OðjgjÞ 3NR  ModExp computing operation functions and tested their performances
ðjgj þ 1 ÞExp to check with aforementioned theoretical analysis. The evalu-
Equal 6  ModExp þ OðjgjÞ 6NR  ModExp ations are performed on a laptop with Intel Core i5-3337U
ðjgj þ 1 ÞExp CPU 1.8 GHz and 8 GB RAM with Java Pairing-Based Cryp-
Vari. – – NR ððN þ 2Þ  tography library (jPBC). To achieve better accuracy, we tested
ModExpþ
each algorithm 500 times and reported the average value of
ðjgj þ 1ÞExpÞ)
all testing results. Unless particularly specified, the parame-
Authority ALL NR ðjgj þ 1ÞExp OðjgjÞ –
ters in our tests are set as the default values listed in Table 4.
DR ALL 1  ModExpþ# Oð#Þ 1  ModExp Note: In our simulations, we set Lðck1 Þ ¼ Lðck2 Þ ¼ 250
BiPair
bits and employ the curve of TYPE A in jPBC (http://gas.dia.
Notes: N: the number of provided data; BiPair: the bilinear pairing in ABE; unisa.it/projects/jpbc/docs/ecpg.html#TypeA). If higher
Exp : the exponentiation in ABE; ModExp : the modular exponentiation in security is desired, TYPE E can be adopted to support keys
HRES; ModMul : the modular multiplication; ALL: fits all schemes; jgj: the
number of attributes in access policy tree T ; #: the number of attributes needed
with longer length Lðck1 Þ ¼ Lðck2 Þ ¼ 500 bits. In our test
to satisfy policy T ; NR : the number of data requesters. machine, one pairing can be computed in approximately 9.8
milliseconds (ms).
5.2.2 Communication Overhead In our proposed schemes, we adopt HRES to achieve the
Each ciphertext is composed of two parts: ½mi  ¼ fTi ; Ti 0 g. It privacy-preserving data processing, while ABE is used to
is highly related to the length of n2 , which has 2LðnÞ bits. realize the data access control. As they are influenced by dif-
Hence, it has to transmit 4LðnÞ bits for each ciphertext. ferent parameters, we analyze the efficiency of data process-
Here, we set the bit length of each element in ABE to be LD . ing and access control separately. The CP in Step 4 and DSP
Further, we summarize the communication overhead in in Step 5 encrypt the partial decryption key using ABE and
each scheme and compare with existing work with the
assumption of N pieces of provided data, which is shown TABLE 4
in Table 3. Notably, the communication overhead in Data Parameter Settings
Analysis (e.g., Add., Sub. and Mul., etc.) can be amortized
over multi-user accesses, while the communication cost Parameter Value (bits)
during Data Access is needed for each authorized DR. LðnÞ 1024
Moreover, the communication overhead caused by data Lðmi Þ LðnÞ=4
provision can also be amortized by other data processing, Lðski Þ ¼ Lðskj Þ ¼ LðskDSP Þ ¼ LðskCP Þ 500
Lðck1 Þ ¼ Lðck2 Þ 250
which is not counted in Table 3. We can observe that the
Lðr Þ ¼ Lðc Þ 500
communication overhead in Addition and Subtraction does LðRÞ ðLðnÞ=4Þ  10
not rely on the number of provided data, while the
DING ET AL.: PRIVACY-PRESERVING DATA PROCESSING WITH FLEXIBLE ACCESS CONTROL 373

Fig. 3. Operation time of DPs with different length of n. Fig. 5. Operation time of CP with different length of n.

Fig. 4. Operation time of DSP in Step 3 with different length of n. Fig. 6. Operation time of DSP in Step 5 with different length of n.

the DR decrypts to obtain the raw key with ABE in Step 6,


the computation time of which are all presented in Test 4.
Other data processing computation costs introduced by the
ABE algorithm are simulated in Tests 1, 2 and 3.
1) Efficiency of Data Processing
Test 1: Influence of the length of n on data processing
We presented the computation time of four involved
entities: DP, DSP, CP, and DR respectively. The DP only
involves in Step 2, which is similar in all schemes. We
directly tested its computation cost with different length of
n as shown in Fig. 3. We can observe that it is efficient and
acceptable for DP with constrained resources.
The computation costs of DSP include two parts: Step 3
and Step 5. For a clearer presentation, we do not combine Fig. 7. Operation time of DR with different length of n.
them, but present them in Figs. 4 and 6 respectively. We can
observe that the cost grows with the increase of the bit length In general, the above tests prove that most computation
of n. In addition, the Equality Test is the most time-consuming, costs are undertaken by the DSP and the CP. The cloud
which needs about 750 ms when n achieves 2048 bits, while users do not have much computation overhead. This result
other algorithms take less than 400 ms. The DSP needs to pro- shows the practical advantage of the proposed schemes in
cess the Comparing twice to complete Equality Test. The per- the usage of mobile environments.
formance evaluation of which is consistent with our analysis 2) Flexibility of Addition, Subtraction and Multiplication
in Section 5.2.2. The computation cost of the DSP in Step 5 is The operations of DSP include Step 3 and Step 5, the time
shown in Fig. 6. Generally, our proposed schemes are accept- of which are marked separately as DSP(1) and DSP(2) in
able for the cloud service provider, DSP. Figs. 8, 9, and 10.
From Fig. 5 that shows the computation cost of the CP, Test 2: Performance of Addition and Subtraction with a large
the Equality Test is also the most time-consuming while number of provided data
others take merely about 100 ms. As shown in Fig. 7, the In this experiment, we tested the performance of three
computation cost of the DR is much less than those of two kinds of system entities (i.e., DSP, CP and DR) in Addition
servers. Even when the bit length of n reaches 2048 bits, it with different numbers of provided data (N ¼ 10; 102 ;
still only needs about 25 ms to complete the computation. 103 ; 104 ; 105 ). As shown in Fig. 8, the computation cost of the
374 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 17, NO. 2, MARCH/APRIL 2020

Fig. 10. Operation time of each entity in Multiplication with different num-
Fig. 8. Operation time of each entity in Addition with different number of ber of DPs.
DPs.

DSP in Step 3 increases with the number of the provided processing and the data retrieve, respectively. Here, we
data, while it does not influence other steps. Even when the focus on the performance of ABE through one test.
number of provided data reaches 104 , the DSP only takes Test 4: Performance of ABE with different numbers of
about 530 ms. It takes almost the same time for the DR to attributes
complete the computation with different numbers of pro- In this experiment, we tested the performance of five
vided pieces of data. This fact implies that our schemes can steps of ABE with different number of attributes: System
deal with a great number of data for addition efficiently. Setup (Setup_ABE), Encryption (Enc_ABE), Key Generation
PW (KeyGen_ABE), Decryption (Dec_ABE) and its homomor-
PNWe assume that the subtraction formula is ð i¼1 mi  phic computation (HE_ABE). The test was executed with
i¼W þ1 mi Þ with W ¼ N=2, which means that half of the
provided data is subtracted from the sum of another half. the setting that all universal attributes are involved in
Fig. 9 shows its performance, which is similar to that of encryption and that one attribute is needed to satisfy the
Addition and is efficient to support a big number of DPs. policy tree. That is, OðjUjÞ ¼ #, which varies from 2 to 8 in
our tests while OðjgjÞ ¼ 1.
In general, the scheme can flexibly be used in various sit-
Fig. 11 shows the costs of all operations in ABE except the
uations with different number of data providers.
algorithm HE_ABE, as it only takes less than 1ms. By apply-
Test 3: Performance of Multiplication with a large number of
ing trust-based access control schemes [15], [16], [17], the
provided data
decryption only involves one attribute and takes only
Different from Addition and Subtraction, the Multiplication
10 ms. We can observe that the computation cost of other
is time-consuming and communication-consuming. It is not
algorithms is proportional to the number of attributes.
flexible and possible to support the computation of a huge
Though employing ABE would cause high computation
number of provided data. Thus, we only tested it with lim-
overhead, high security and fine-grained access control can
ited numbers ðN ¼ 100; 200; 300; 400; 500; 600; 700; 800Þ.
be supported. Most computations are taken by cloud serv-
Moreover, the original data length is set as LðnÞ=N.
ers. In addition, the cloud servers only need to perform the
As shown in Fig. 10, it takes about 15 seconds to finish the
setup and encryption once, which can be amortized by mul-
computation in Step 3 for the DSP when the number of pro-
tiple accesses of DRs.
vided messages achieves 800. However, the data numbers
4) Experimental Comparison with Existing Work
do not influence the computation cost of the DR and no extra
Test 5: Performance comparison of Multiplication schemes in
overhead is introduced, which merely costs about 6.7 ms.
our work with an existing scheme in [18]
3) Efficiency of Attribute-Based Encryption
In this test, we compared the performance of Multiplica-
The non-colluding servers and the DRs employ ABE to
tion in our scheme with an existing scheme [18], as shown in
realize the flexible access control over the result of data
Fig. 12. We obtained the total computation time of all

Fig. 9. Operation time of each entity in Subtraction with different number


of DPs. Fig. 11. Operation time of KPABE with different numbers of attributes.
DING ET AL.: PRIVACY-PRESERVING DATA PROCESSING WITH FLEXIBLE ACCESS CONTROL 375

TABLE 5
Comparison with Existing Work in Multiplication

Communication Computation cost


cost (bits)
PHE- 36  N  s 18N operations over
based [5] (s ¼ 1024) Z2s (s ¼ 1024)
SMC- 480  ðN  1Þ 3N operations
based [27] (with 32-bit data) over Z232
FHE- 0 N operations over
based [30] Z2s (s > 106 )
Our work ð4N þ 3Þ  s ð4N þ 3Þ operations
(s ¼ 1024) over Z2s (s ¼ 1024)
Note: s is the basic parameter and is different in each scheme; N: the number of
Fig. 12. Performance comparison of Multiplication schemes in our work provided data;
and previous scheme [18].
ACKNOWLEDGMENTS
involved entities with different number of DRs (NR ¼ 2; This work is sponsored by the National Key Research and
4; 6; 8; 10). By comparing the performance of the two schemes Development Program of China (grant 2016YFB0800704),
with two DPs, we can see that our proposed scheme outper- the NSFC (grants 61672410 and U1536202), the Project Sup-
forms that in [18] when the number of DRs is over 3. More- ported by Natural Science Basic Research Plan in Shaanxi
over, we compared the performance of two schemes with Province of China (Program No. 2016ZDJC-06), the Funda-
different number of DPs (N ¼ 2; 10). By observing the simu- mental Research Funds for the Central Universities (grant
lation results, we find that our scheme shows much superior- JBG161509), the 111 project (grants B08038 and B16037), Acad-
ity in performance, especially for a big number of DPs. emy of Finland (grant 308087), and the AXA Research Fund.

5.3 Comparison with Existing work REFERENCES


Herein, we further compare our proposed scheme with some [1] A. Belle, R. Thiagarajan, S. Soroushmehr, F. Navidi, D. A. Beard,
related work. With regard to secure data processing, HE- and K. Najarian, “Big data analytics in healthcare,” BioMed Res.
Int., vol. 6, 2015, Art. no. 370194.
based schemes [5], [30] provide a feasible way to deal with [2] J. J. Stephen, S. Savvides, R. Seidel, and P. Eugster, “Practical con-
the computation over encrypted data. But they have a seri- fidentiality preserving big data analysis,” in Proc. 6th USENIX
ous problem because they are all single-user systems, which Workshop Hot Topics Cloud Comput., 2014, pp. 10–10.
restricts the possibility of multi-user access control. SMC- [3] B. Wang, M. Li, S. S. Chow, and H. Li, “A tale of two clouds: Com-
puting on data encrypted under multiple keys,” in Proc. IEEE
based scheme [27] enables flexible access via secret sharing. Conf. Commun. Netw. Secur., 2014, pp. 337–345.
However, they all introduce high computation overhead in [4] A. Peter, E. Tews, and S. Katzenbeisser, “Efficiently outsourcing
big data processing, especially for multiplication. For a more multiparty computation under multiple keys,” IEEE Trans. Inf.
Forensics Secur., vol. 8, no. 12, pp. 2046–2058, Dec. 2013.
intuitive comparison, we compare their communication cost [5] X. Liu, R. Choo, R. Deng, R. Lu, and J. Weng, “Efficient and pri-
and computation cost in multiplication over N pieces of data vacy-preserving outsourced calculation of rational numbers,”
with our scheme in Table 5. The result shows the advantages IEEE Trans. Dependable Secure Comput., vol. PP, no. 99, 2016,
of our scheme in terms of communication and computation doi: 10.1109/TDSC.2016.2536601.
[6] X. Liu, R. Deng, W. Ding, R. Lu, and B. Qin, “Privacy-preserv-
efficiency. Moreover, no existing work overcomes the chal- ing outsourced calculation on floating point numbers,” IEEE
lenges to realize multiple computations over encrypted data Trans. Inf. Forensics Secur., vol. 11, no. 11, pp. 2513–2527,
and flexible access control over the processing result. Obvi- Nov. 2016.
[7] R. Bost, R. A. Popa, S. Tu, and S. Goldwasser, “Machine learning
ously, our work overcomes the current research challenges
classification over encrypted data,” IACR Cryptology ePrint
and effectively achieves flexible and secure computations Archive, vol. 2014, 2014, Art. no. 331.
over encrypted data with fine-grained access control. [8] Z. Yan, P. Zhang, and A. V. Vasilakos, “A survey on trust manage-
ment for internet of things,” J. Netw. Computer Appl., vol. 42,
pp. 120–134, 2014.
6 CONCLUSION [9] A. Khedr and G. Gulak, “SecureMed: Secure medical computation
using GPU-accelerated homomorphic encryption scheme,” IEEE
In this paper, we proposed an efficient and secure scheme J. Biomed. Health Inf., Jan. 2017, doi: 10.1109/JBHI.2017.2657458.
to achieve privacy-preserving data processing with ABE- [10] Z. Brakerski, C. Gentry, and V. Vaikuntanathan, “(Leveled)
based flexible access control. It can support seven basic fully homomorphic encryption without bootstrapping,” in
Proc. 3rd Innovations Theoretical Comput. Sci. Conf., 2012,
operations and achieve fine-grained access control without pp. 309–325.
the need of fully trusted cloud servers. Security analysis, [11] C. Gentry, “Computing arbitrary functions of encrypted data,”
performance evaluation and performance comparison with Commun. ACM, vol. 53, no. 3, pp. 97–105, 2010.
existing work further demonstrated that our scheme is effi- [12] M. Van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, “Fully
homomorphic encryption over the integers,” in Proc. Adv. Cryptol-
cient and effective with regard to big data processing opera- ogy–EUROCRYPT, 2010, pp. 24–43.
tions. In the future, we are going to realize more operations, [13] V. C. Hu, T. Grance, D. F. Ferraiolo, and D. R. Kuhn, “An access
improve scheme efficiency and overcome latency by apply- control scheme for big data processing,” in Proc. Int. Conf. Collabo-
rative Comput.: Netw. Appl. Worksharing, 2014, pp. 1–7.
ing edge computing and pre-processing technologies. On [14] Z. Yan, W. Ding, V. Niemi, and A. V. Vasilakos, “Two schemes of
the other hand, we will further explore significant applica- privacy-preserving trust evaluation,” Future Generation Comput.
tions of our scheme towards practical use. Syst., vol. 62, pp. 175–189, 2015.
376 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 17, NO. 2, MARCH/APRIL 2020

[15] C. Huang, Z. Yan, N. Li, and M. Wang, “Secure pervasive social [40] M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalable and secure
communications based on trust in a distributed way,” IEEE Access, sharing of personal health records in cloud computing using attri-
vol. 4, pp. 9225–9238, 2016. bute-based encryption,” IEEE Trans. Parallel Distrib. Syst., vol. 24,
[16] Z. Yan, X. Li, M. Wang, and A. Vasilakos, “Flexible data access no. 1, pp. 131–143, Jan. 2013.
control based on trust and reputation in cloud computing,” IEEE [41] Z. Wan, J. E. Liu, and R. H. Deng, “HASBE: A hierarchical attri-
Trans. Cloud Comput., vol. 5, no. 3, pp. 485–498, Jul.-Sep. 2015. bute-based solution for flexible and scalable access control in
[17] Z. Yan, X. Li, and R. Kantola, “Controlling cloud data access based cloud computing,” IEEE Trans. Inf. Forensics Secur., vol. 7, no. 2,
on reputation,” Mobile Netw. Appl., vol. 20, no. 6, pp. 828–839, 2015. pp. 743–754, Apr. 2012.
[18] W. Ding, Z. Yan, and R. H. Deng, “Encrypted data processing [42] P. Paillier, “Public-key cryptosystems based on composite degree
with homomorphic re-encryption,” Inf. Sci., vol. 409-410, pp. 35– residuosity classes,” in Proc. Adv. Cryptology—EUROCRYPT,
55, 2017. 1999, pp. 223–238.
[19] E. Ayday, J. L. Raisaro, J.-P. Hubaux, and J. Rougemont, “Protect- [43] E. Bresson, D. Catalano, and D. Pointcheval, “A simple public-key
ing and evaluating genomic privacy in medical tests and personal- cryptosystem with a double trapdoor decryption mechanism
ized medicine,” in Proc. 12th ACM Workshop Privacy Electron. Soc., and its applications,” in Proc. Adv. Cryptology-ASIACRYPT, 2003,
2013, pp. 95–106. pp. 37–54.
[20] C. Castelluccia, A. C. Chan, E. Mykletun, and G. Tsudik, “Efficient
and provably secure aggregation of encrypted data in wireless Wenxiu Ding received the BEng degree in infor-
sensor networks,” ACM Trans. Sens. Netw., vol. 5, no. 3, 2009, mation security from Xidian University, Xi’an,
Art. no. 20. China, in 2012. Now, she is working toward the
[21] T.-H. H. Chan, E. Shi, and D. Song, “Privacy-preserving stream PhD degree in information security in the School of
aggregation with fault tolerance,” in Financial Cryptography and Telecommunications Engineering, Xidian Univer-
Data Security. Berlin, Germany: Springer, 2012, pp. 200–214. sity. She was the research assistant in the School
[22] Q. Li, G. Cao, and T. La Porta, “Efficient and privacy-aware data of Information Systems, Singapore Management
aggregation in mobile sensing,” IEEE Trans. Dependable Secure University from 2015 to 2016. Her research inter-
Comput., vol. 11, no. 2, pp. 115–129, Mar. 2014. ests include RFID authentication, privacy preser-
[23] Q. Li and G. Cao, “Efficient privacy-preserving stream aggrega- vation, data mining and trust management.
tion in mobile sensing with low aggregation error,” in Proc. Int.
Symp. Privacy Enhancing Technol. Symp., 2013, pp. 60–81.
[24] M. Joye and B. Libert, “A scalable scheme for privacy-preserving Zheng Yan (M’06, SM’14) received the BEng
aggregation of time-series data,” in Proc. Int. Conf. Financial Cryp- degree in electrical engineering and the MEng
tography Data Secur., 2013, pp. 111–125. degree in computer science and engineering
[25] E. Shi, T. H. Chan, E. Rieffel, R. Chow, and D. Song, “Privacy-pre- from Xi’an Jiaotong University, Xi’an, China, in
serving aggregation of time-series data,” in Proc. 18th Annu. Netw. 1994 and 1997, respectively, the second MEng
Distrib. Syst. Secur. Symp., 2011, pp. 1–17. degree in information security from the National
[26] D. Bogdanov, R. Talviste, and J. Willemson, “Deploying secure University of Singapore, Singapore, in 2000, and
multi-party computation for financial data analysis,” in Proc. Int. the licentiate of science and the doctor of science
Conf. Financial Cryptography Data Secur., 2012, pp. 57–64. in technology in electrical engineering from the
[27] L. Kamm and J. Willemson, “Secure floating point arithmetic and Helsinki University of Technology (current Aalto
private satellite collision analysis,” Int. J. Inf. Secur., vol. 14, no. 6, University), Helsinki, Finland, in 2005 and 2007.
pp. 531–548, 2015. She is currently a full professor with the Xidian University, Xi’an, China
[28] D. Bogdanov, “Sharemind: Programmable secure computations and a visiting professor and an academy research fellow with the Aalto
with practical applications,” PhD dissertation, University of University, Espoo, Finland. Her research interests include trust, security
Tartu, Estonia, 2013. and privacy, as well as data mining. She is serving as an associate editor
[29] J. H. Cheon, et al., “Batch fully homomorphic encryption over of the IEEE Internet of Things Journal, the IEEE Access, the Information
the integers,” in Proc. Annu. Int. Conf. Theory Appl. Cryptographic Sciences, the Information Fusion, the Journal of Network and Computer
Techn., 2013, pp. 315–335. Applications, the Soft Computing, the Security and Communication Net-
[30] W. Wang, Y. Hu, L. Chen, X. Huang, and B. Sunar, “Exploring the works, etc. twelve journals. She serves as an organization and program
feasibility of fully homomorphic encryption,” IEEE Trans. Com- committee member for numerous international conferences. She is a
put., vol. 64, no. 3, pp. 698–706, Mar. 2015. senior member of the IEEE.
[31] L. Morris. “Analysis of partially and fully homomorphic
encryption,” (2017). [Online]. Available: http://www.liammorris.
com/crypto2/Homomorphic%20Encryption%20Paper.pdf Robert H. Deng is AXA chair professor of
[32] X. Liu, R. H. Deng, Y. Yang, H. N. Tran, and S. Zhong, “Hybrid pri- Cybersecurity and director of the Secure Mobile
vacy-preserving clinical decision support system in fog–cloud Centre, School of Information Systems, Singa-
computing,” Future Generation Comput. Syst., vol. 78, pp. 825–837, 2018. pore Management University. His research inter-
[33] Z. Yan, W. Ding, and H. Zhu, “A scheme to manage encrypted ests include the areas of data security and
data storage with deduplication in cloud,” in Proc. Int. Conf. Algo- privacy, cloud security and Internet of Things
rithms Archit. Parallel Process., 2015, pp. 547–561. security. He received the Outstanding University
[34] C. Dong, G. Russello, and N. Dulay, “Shared and searchable Researcher Award from National University of
encrypted data for untrusted servers,” in Proc. IFIP Annu. Conf. Singapore, Lee Kuan Yew fellowship for Research
Data Appl. Secur. Privacy, 2008, pp. 127–143. Excellence from SMU, and Asia-Pacific Informa-
[35] W. C. Garrison III, A. Shull, S. Myers, and A. J. Lee, “On the tion Security Leadership Achievements Commu-
practicality of cryptographically enforcing dynamic access control nity Service Star from International Information Systems Security
policies in the cloud,” in Proc. IEEE Symp. Secur. Privacy, 2016, Certification Consortium. His professional contributions include an exten-
pp. 819–838, doi: 10.1109/SP.2016.54. sive list of positions in several industry and public services advisory
[36] T. Zhu, W. Liu, and J. Song, “An efficient role based access control boards, editorial boards and conference committees. These include the
system for cloud computing,” in Proc. IEEE 11th Int. Conf. Comput. editorial boards of the IEEE Security & Privacy Magazine, the IEEE
Inf. Technol., 2011, pp. 97–102. Transactions on Dependable and Secure Computing, the IEEE Transac-
[37] J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attri- tions on Information Forensics and Security, the Journal of Computer
bute-based encryption,” in Proc. IEEE Symp. Secur. Privacy, 2007, Science and Technology, and Steering Committee chair of the ACM Asia
pp. 321–334. Conference on Computer and Communications Security.
[38] V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based
encryption for fine-grained access control of encrypted data,” in
Proc. 13th ACM Conf. Comput. Commun. Secur., 2006, pp. 89–98. " For more information on this or any other computing topic,
[39] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable,
please visit our Digital Library at www.computer.org/csdl.
and fine-grained data access control in cloud computing,” in Proc.
IEEE INFOCOM, 2010, pp. 1–9.

You might also like