TY - GEN
T1 - Distributed computing over encrypted data
AU - Freris, Nikolaos M.
AU - Patrinos, Panagiotis
PY - 2017/2/10
Y1 - 2017/2/10
N2 - We present a new theme for performing computations directly on encrypted data: the concept of homomorphic encryption, i.e., cryptosystems that allow a user to manipulate encrypted information even without knowing the secret key. In an attempt to alleviate the gap between cryptography which naturally operates on rings, groups, and fields, and signal processing which typically operates on real(complex)-valued data, we set the stage for distributed operations on encrypted data. We leverage advances in homomorphic encryption (such as the RSA, Paillier and Gentry cryptosystems), and in quantized signal processing and consensus to devise encryption-friendly distributed computing primitives. In specific, we show how to perform encrypted average consensus with finite-time convergence, using modular multiplication and exponentiation on encrypted information. We present the architecture for secure cloud computing and discuss its advantages and applicability to a wide range of data mining, signal processing and control operations over the cloud.
AB - We present a new theme for performing computations directly on encrypted data: the concept of homomorphic encryption, i.e., cryptosystems that allow a user to manipulate encrypted information even without knowing the secret key. In an attempt to alleviate the gap between cryptography which naturally operates on rings, groups, and fields, and signal processing which typically operates on real(complex)-valued data, we set the stage for distributed operations on encrypted data. We leverage advances in homomorphic encryption (such as the RSA, Paillier and Gentry cryptosystems), and in quantized signal processing and consensus to devise encryption-friendly distributed computing primitives. In specific, we show how to perform encrypted average consensus with finite-time convergence, using modular multiplication and exponentiation on encrypted information. We present the architecture for secure cloud computing and discuss its advantages and applicability to a wide range of data mining, signal processing and control operations over the cloud.
KW - Cloud computing
KW - Cryptography
KW - Cyberphysical systems
KW - Data mining
KW - Distributed algorithms
KW - Homomorphic encryption
KW - Machine learning
KW - Privacy
KW - Quantized optimization
KW - Security
KW - Signal processing
UR - http://www.scopus.com/inward/record.url?scp=85015147818&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85015147818&partnerID=8YFLogxK
U2 - 10.1109/ALLERTON.2016.7852360
DO - 10.1109/ALLERTON.2016.7852360
M3 - Conference contribution
AN - SCOPUS:85015147818
T3 - 54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016
SP - 1116
EP - 1122
BT - 54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 54th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2016
Y2 - 27 September 2016 through 30 September 2016
ER -