Open Access iconOpen Access

ARTICLE

crossmark

An Effective Security Comparison Protocol in Cloud Computing

by Yuling Chen1,2, Junhong Tao1, Tao Li1,*, Jiangyuan Cai3, Xiaojun Ren4

1 State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, 550000, China
2 Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, 550000, China
3 POWERCHINA Guizhou Electric Power Engineering Co., Ltd., Guiyang, 550000, China
4 Blockchain Laboratory of Agricultural Vegetables, Weifang University of Science and Technology, Weifang, 261000, China

* Corresponding Author: Tao Li. Email: email

Computers, Materials & Continua 2023, 75(3), 5141-5158. https://doi.org/10.32604/cmc.2023.037783

Abstract

With the development of cloud computing technology, more and more data owners upload their local data to the public cloud server for storage and calculation. While this can save customers’ operating costs, it also poses privacy and security challenges. Such challenges can be solved using secure multi-party computation (SMPC), but this still exposes more security issues. In cloud computing using SMPC, clients need to process their data and submit the processed data to the cloud server, which then performs the calculation and returns the results to each client. Each client and server must be honest. If there is cooperation or dishonest behavior between clients, some clients may profit from it or even disclose the private data of other clients. This paper proposes the SMPC based on a Partially-Homomorphic Encryption (PHE) scheme in which an addition homomorphic encryption algorithm with a lower computational cost is used to ensure data comparability and Zero-Knowledge Proof (ZKP) is used to limit the client's malicious behavior. In addition, the introduction of Oblivious Transfer (OT) technology also ensures that the semi-honest cloud server knows nothing about private data, so that the cloud server of this scheme can calculate the correct data in the case of malicious participant models and safely return the calculation results to each client. Finally, the security analysis shows that the scheme not only ensures the privacy of participants, but also ensures the fairness of the comparison protocol data.

Keywords


Cite This Article

APA Style
Chen, Y., Tao, J., Li, T., Cai, J., Ren, X. (2023). An effective security comparison protocol in cloud computing. Computers, Materials & Continua, 75(3), 5141-5158. https://doi.org/10.32604/cmc.2023.037783
Vancouver Style
Chen Y, Tao J, Li T, Cai J, Ren X. An effective security comparison protocol in cloud computing. Comput Mater Contin. 2023;75(3):5141-5158 https://doi.org/10.32604/cmc.2023.037783
IEEE Style
Y. Chen, J. Tao, T. Li, J. Cai, and X. Ren, “An Effective Security Comparison Protocol in Cloud Computing,” Comput. Mater. Contin., vol. 75, no. 3, pp. 5141-5158, 2023. https://doi.org/10.32604/cmc.2023.037783



cc Copyright © 2023 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 946

    View

  • 545

    Download

  • 0

    Like

Share Link