3rd International ICST Workshop on the Value of Security through Collaboration

Research Article

Secure Computation for Data Privacy

  • @INPROCEEDINGS{10.1109/SECCOM.2007.4550308,
        author={Meena Singh and Ashutosh Saxena},
        title={Secure Computation for Data Privacy},
        proceedings={3rd International ICST Workshop on the Value of Security through Collaboration},
        publisher={IEEE},
        proceedings_a={SECOVAL},
        year={2008},
        month={6},
        keywords={Data Privacy Mobile Code Reducible Rank Code Secure Computation.},
        doi={10.1109/SECCOM.2007.4550308}
    }
    
  • Meena Singh
    Ashutosh Saxena
    Year: 2008
    Secure Computation for Data Privacy
    SECOVAL
    IEEE
    DOI: 10.1109/SECCOM.2007.4550308
Meena Singh1,*, Ashutosh Saxena1,*
  • 1: Application Security and Privacy Group, SET Labs, Infosys Technologies Limited, Hyderabad, Andhra Pradesh, INDIA, 500019.
*Contact email: MeenaDilip_Singh@infosys.com, Ashutosh_Saxena01@infosys.com

Abstract

The Secure Mobile Code is a fragment of code being executed in some unfamiliar and untrusted environment. Protecting integrity and maintaining confidentially of the code execution in unfamiliar environment has been a challenging task. The host environment may try to guess the functionality of the code received. This generates a need to design a scheme that can perform secure computation on encoded data and leaving no clues for the host to guess the functionality and data. In our scheme, the sender will generate the code which is transformed to hide the functionality and she will send it along with encoded data to the host. Subsequently, the host will run the code on the encoded data and send the result to the sender. The functionality is protected by the encoded gates where the truth table is transformed using the Reducible Rank Codes[1]. We also present a detail security analysis and complexity of our scheme. Our scheme finds application where the data computation has been outsourced to other party.