Privacy preserving protocol for service aggregation in cloud computing

  • Authors:
  • Peishun Wang;Yi Mu;Willy Susilo;Jun Yan

  • Affiliations:
  • School of Computer Science and Software Engineering, University of Wollongong, Northfields Avenue, Wollongong, New South Wales 2522Australia;School of Computer Science and Software Engineering, University of Wollongong, Northfields Avenue, Wollongong, New South Wales 2522Australia;School of Computer Science and Software Engineering, University of Wollongong, Northfields Avenue, Wollongong, New South Wales 2522Australia;School of Information Systems and Technology, University of Wollongong, Northfields Avenue, Wollongong, New South Wales 2522Australia

  • Venue:
  • Software—Practice & Experience
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Cloud computing has increasingly become a new model in the world of computing, and more businesses are moving to the cloud. As a cost-effective and time-efficient way to develop new applications and services, service aggregation in cloud computing empowers all service providers and consumers and creates tremendous opportunities in various industry sectors. However, it also poses various challenges to the privacy of personal information as well as the confidentiality of business and governmental information. The full benefits of service aggregation in cloud computing would only be enjoyed if the privacy concerns are addressed properly. In this paper, we investigate the privacy issues in service aggregation in a cloudenvironment and propose a privacy preserving protocol that is suitable for this environment. To demonstrate the security of our system, we construct a security game called IND-P3SAC-CPA and prove the security of the protocol accordingly. Our protocol has a distinct property that allows any service provider to obtain only the queried data under its conspiracy with the cloud. Additionally, the efficiency and various extensions are also discussed. Copyright © 2011 John Wiley & Sons, Ltd.