COMPARISON AND IMPLEMENTATION OF SECRET SHARING SUITABLE FOR LIFE LOG SYSTEM
Proceeding: The International Conference on Electrical and Electronics Engineering, Clean Energy and Green Computing (EEECEGC)Publication Date: 2013-11-11
Authors : Satoshi Takahashi; Hyunho Kang; Keiichi Iwamura;
Page : 16-29
Keywords :
Abstract
Recently, the application of data mining to big data has been attracting much attention. However, the huge data to which data mining is applied include users' personal information. Thus, data mining that preserves the privacy of the user is now an active area of research; in particular, secure multiparty computation (MPC), which allows encrypted data to be calculated without decrypting it, is being studied. In this paper, first we present two methods broadly classified as "secret sharing" and "homomorphic encryption", which can perform secure multi-party computation. In the secret sharing method, the burden of the required storage capacity falls on users who try to manage their own data. On the other hand, in the homomorphic encryption method, a user or a cloud system that tries to operate secure multi-party computation bears the large calculation burden. The GCCE method, which we proposed at GCCE 2013, can, however, resolve these problems. Then, we evaluate each method in terms of the required storage capacity and amount of calculation. Finally, we show the results of implementing GCCE in a specific application.
Other Latest Articles
- USING DSM TO GENERATE DATABASE SCHEMA AND DATA MANAGEMENT
- IMPLEMENTATION OF NOVEL ACCOUNTING, PRICING AND CHARGING MODELS IN A CLOUD-BASED SERVICE PROVISIONING ENVIRONMENT
- Measuring Supply chain Efficiency: an empirical study of Gabonese company
- THE EFFECT OF LEADERSHIP BEHAVIOURS ON STAFF PERFORMANCE IN SOMALIA
- COMMUNICATION OF ORGANISATIONAL CHANGE AND EMPLOYEE PERFORMANCE: A SURVEY OF TEACHERS SERVICE COMMISSION EMPLOYEES IN KENYA
Last modified: 2014-01-05 06:38:07