Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Secure and fast aggregation of financial data in cloud-based expense tracking applications
Corena J., Ohtsuki T. Journal of Network and Systems Management20 (4):534-560,2012.Type:Article
Date Reviewed: Jan 31 2013

Corena and Ohtsuki apply three secure algorithms with additive homomorphism to the problem of securely storing financial information, such as customer receipts, on an untrusted cloud server. The three algorithms considered include a symmetric algorithm for efficient aggregation of information in sensor networks [1], Paillier’s public key additive homomorphic cryptosystem [2], and Shamir’s secret sharing scheme [3]. The authors implement all three algorithms as solutions to the given problem and compare their performance. To reduce server load when performing result aggregation, the authors also propose a simple fast aggregation algorithm that is based on dynamic programming.

The paper is well written and organized. It is structured as a survey paper and its main contribution lies in the application and practical comparison of the three existing algorithms. While the authors do not provide any substantially new algorithms, the application of existing algorithms to the problem of securing financial data in a cloud server will be of particular interest to practitioners in this field.

Reviewer:  Burkhard Englert Review #: CR140894 (1305-0396)
1) Castelluccia, C.; Chan, A. C. F.; Mykletun, E.; Tsudik, G. Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Trans. on Sensor Networks 5, (2009), 1–36.
2) Paillier, P. Public-key cryptosystems based on composite degree residuosity classes. In Proc. 17th Int. Conf. on Theory and Application of Cryptographic Techniques (EUROCRYPT’99) Springer, 1999, 223–238.
3) Shamir, A. How to share a secret. Communications of the ACM 22, 11(1979), 612–613.
Bookmark and Share
  Featured Reviewer  
 
Data Encryption (E.3 )
 
 
Cloud Computing (C.2.4 ... )
 
 
Security and Protection (C.2.0 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption": Date
ESA/390 integrated cryptographic facility
Yeh P., Ronald M. S. IBM Systems Journal 30(2): 192-205, 1991. Type: Article
Feb 1 1992
Design and implementation of an RSA cryptosystem using multiple DSP chips
Er M., Wong D., Sethu A., Ngeow K. Microprocessors & Microsystems 15(7): 369-378, 1991. Type: Article
Nov 1 1993
An introduction to cryptography
Diffie W. (ed), Hellman M., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Feb 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy