Secured communication for business process outsourcing using optimized arithmetic cryptography protocol based on virtual parties

3Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Within a span of over a decade, India has become one of the most favored destinations across the world for Business Process Outsourcing (BPO) operations. India has rapidly achieved the status of being the most preferred destination for BPO for companies located in the US and Europe. Security and privacy are the two major issues needed to be addressed by the Indian software industry to have an increased and long-term outsourcing contract from the US. Another important issue is about sharing employee's information to ensure that data and vital information of an outsourcing company is secured and protected. To ensure that the confidentiality of a client's information is maintained, BPOs need to implement some data security measures. In this paper, we propose a new protocol for specifically for BPO Secure Multi-Party Computation (SMC). As there are many computations and surveys which involve confidential data from many parties or organizations and the concerned data is property of the organization, preservation and security of this data is of prime importance for such type of computations. Although the computation requires data from all the parties, but none of the associated parties would want to reveal their data to the other parties. We have proposed a new efficient and scalable protocol to perform computation on encrypted information. The information is encrypted in a manner that it does not affect the result of the computation. It uses modifier tokens which are distributed among virtual parties, and finally used in the computation. The computation function uses the acquired data and modifier tokens to compute right result from the encrypted data. Thus without revealing the data, right result can be computed and privacy of the parties is maintained. We have given a probabilistic security analysis of hacking the protocol and shown how zero hacking security can be achieved. Also we have analyzed the specific case of Indian BPO. © 2009 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

Pathak, R., & Joshi, S. (2009). Secured communication for business process outsourcing using optimized arithmetic cryptography protocol based on virtual parties. In Communications in Computer and Information Science (Vol. 40, pp. 205–215). https://doi.org/10.1007/978-3-642-03547-0_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free