Verifying Outsourced Inner Product Computation via Vector Aggregation in Cloud Computing
نویسندگان
چکیده
Outsourced computation has been extensively studied in a number of computer application fields with the increasing prevalence of cloud computing. As the basis and the fundamental operation, inner product computation of vectors, has also been put forwarded. As the service provider of the cloud computing may not be trustworthy, the correctness of the computation results can be corrupted if the service provider is with random fault or not honest (e.g., lazy, malicious, etc). Therefore, it is necessary for the client to verify the correctness of inner product of vectors. Existing verification mechanisms are almost built on the Merkle tree structure and signature chain mechanism, which lack efficiency on both storage and computation aspects. The existing aggregate verification scheme based on algebraic properties is able to ease such problem, however, there exist some serious design defects and lack important details. In order to solve such problems, in this paper we propose the sound inner product verification schemes based on the algebraic properties. Specifically, we first propose the simple aggravate framework, then we analyze its serious defects under smart cloud attack. Furthermore, we design the local aggregate and random aggregate framework to solve the problems respectively. Finally, we provide analysis of the proposed verification schemes in this paper.
منابع مشابه
Publicly Auditable Inner Product Evaluation from Different Data Sources under Ontime Generated Multiple Keys
Nowadays verifying the result of the remote computation plays a crucial role in addressing in issue of trust. The outsourced data collection comes for multiple data sources to diagnose the originator of errors by allotting each data sources a unique secrete key which requires the inner product conformation to be performed under any two parties different keys. The existing work under single key ...
متن کاملVerifying Result Correctness of Outsourced Frequent Item set Mining using Rob Frugal Algorithm
The server is untrusted and tries to escape from verification by using its prior knowledge of the outsourced data. Outsourcing data mining computations to a third-party service provider (server) offers a costeffective option, especially for data owners (clients) of limited resources. The increasing ability to generate vast quantities of data presents technical challenges for efficient data mini...
متن کاملSESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملEVE: Verifying Correct Execution of Cloud-Hosted Web Applications
We present a new approach to verifying that a completely untrusted, platform-as-a-service cloud is correctly executing an outsourced Web application.
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کامل