Title: Towards an efficient and secure computation over outsourced encrypted data using distributed hash table

Authors: Raziqa Masood; Nitin Pandey; Q.P. Rana

Addresses: Amity Institute of Information Technology, Sector-125, Noida – 201313, UP, India ' Amity Institute of Information Technology, Sector-125, Noida – 201313, UP, India ' Jamia Hamdard University, Hamdard Nagar, New Delhi – 110062, India

Abstract: On-demand access to outsourced data from anywhere has diverted data owners' mind to store their data on the cloud servers instead of standalone devices. Security, privacy, and availability of data are still the major concerns that need to be addressed. A quick overcome for the users from these issues is to encrypt their data with their keys before uploading it to the cloud. However, computing over encrypted data still remains to be highly inefficient and impractical. In this paper, we propose an efficient and secure data outsourcing with the distribution of servers using a distributed hash table mechanism. It helps to compute over the data from multiple owners encrypted using different keys, without leaking the privacy. We observe that our proposed solution has less computation and communication cost from other existing mechanisms while is free from a single point of failure.

Keywords: distributed hash table; DHT; data outsourcing; consistency hash function; homomorphic encryption; proxy re-encryption; peer-to-peer overlay; privacy; security.

DOI: 10.1504/IJCC.2022.124152

International Journal of Cloud Computing, 2022 Vol.11 No.3, pp.217 - 233

Received: 22 May 2019
Accepted: 06 Dec 2019

Published online: 15 Jul 2022 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article