scholarly journals Lightning-fast and privacy-preserving outsourced computation in the cloud

Cybersecurity ◽  
2020 ◽  
Vol 3 (1) ◽  
Author(s):  
Ximeng Liu ◽  
Robert H. Deng ◽  
Pengfei Wu ◽  
Yang Yang
2019 ◽  
Vol 9 (2) ◽  
pp. 79-98 ◽  
Author(s):  
Oladayo Olufemi Olakanmi ◽  
Adedamola Dada

In outsourcing computation models, weak devices (clients) increasingly rely on remote servers (workers) for data storage and computations. However, most of these servers are hackable or untrustworthy, which makes their computation questionable. Therefore, there is need for clients to validate the correctness of the results of their outsourced computations and ensure that servers learn nothing about their clients other than the outputs of their computation. In this work, an efficient privacy preservation validation approach is developed which allows clients to store and outsource their computations to servers in a semi-honest model such that servers' computational results could be validated by clients without re-computing the computation. This article employs a morphism approach for the client to efficiently perform the proof of correctness of its outsourced computation without re-computing the whole computation. A traceable pseudonym is employed by clients to enforce anonymity.


Author(s):  
Oladayo Olufemi Olakanmi ◽  
Adedamola Dada

In outsourcing computation models, weak devices (clients) increasingly rely on remote servers (workers) for data storage and computations. However, most of these servers are hackable or untrustworthy, which makes their computation questionable. Therefore, there is need for clients to validate the correctness of the results of their outsourced computations and ensure that servers learn nothing about their clients other than the outputs of their computation. In this work, an efficient privacy preservation validation approach is developed which allows clients to store and outsource their computations to servers in a semi-honest model such that servers' computational results could be validated by clients without re-computing the computation. This article employs a morphism approach for the client to efficiently perform the proof of correctness of its outsourced computation without re-computing the whole computation. A traceable pseudonym is employed by clients to enforce anonymity.


2015 ◽  
Vol 20 (9) ◽  
pp. 3735-3744 ◽  
Author(s):  
Can Xiang ◽  
Chunming Tang ◽  
Yunlu Cai ◽  
Qiuxia Xu

2017 ◽  
Vol 10 (5) ◽  
pp. 756-770 ◽  
Author(s):  
Ximeng Liu ◽  
Baodong Qin ◽  
Robert H. Deng ◽  
Yingjiu Li

2012 ◽  
Vol 3 (3) ◽  
pp. 60-61
Author(s):  
V.Sajeev V.Sajeev ◽  
◽  
R.Gowthamani R.Gowthamani

Author(s):  
Haruna HIGO ◽  
Toshiyuki ISSHIKI ◽  
Kengo MORI ◽  
Satoshi OBANA

Sign in / Sign up

Export Citation Format

Share Document