Context-Aware Verifiable Cloud Computing
Internet of Things (IoTs) has emerged to motivate various intelligent applications based on the data collected by various “things.” Cloud computing plays an important role for big data processing by providing data computing and processing services. However, cloud service provid...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2017-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/7849191/ |
_version_ | 1818556835475488768 |
---|---|
author | Zheng Yan Xixun Yu Wenxiu Ding |
author_facet | Zheng Yan Xixun Yu Wenxiu Ding |
author_sort | Zheng Yan |
collection | DOAJ |
description | Internet of Things (IoTs) has emerged to motivate various intelligent applications based on the data collected by various “things.” Cloud computing plays an important role for big data processing by providing data computing and processing services. However, cloud service providers may invade data privacy and provide inaccurate data processing results to users, and thus cannot be fully trusted. On the other hand, limited by computation resources and capabilities, cloud users mostly cannot independently process big data and perform verification on the correctness of data processing. This raises a special challenge on cloud computing verification, especially when user data are stored at the cloud in an encrypted form and processed for satisfying the requests raised in different contexts. But the current literature still lacks serious studies on this research issue. In this paper, we propose a context-aware verifiable computing scheme based on full homomorphic encryption by deploying an auditing protocol to verify the correctness of the encrypted data processing result. We design four optional auditing protocols to satisfy different security requirements. Their performance is evaluated and compared through performance analysis, algorithm implementation, and system simulation. The results show the effectiveness and efficiency of our designs. The pros and cons of all protocols are also analyzed and discussed based on rigorous comparison. |
first_indexed | 2024-12-13T23:52:22Z |
format | Article |
id | doaj.art-4ed1d8cf946448f2aa8abe5f96926645 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-13T23:52:22Z |
publishDate | 2017-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-4ed1d8cf946448f2aa8abe5f969266452022-12-21T23:26:43ZengIEEEIEEE Access2169-35362017-01-0152211222710.1109/ACCESS.2017.26668397849191Context-Aware Verifiable Cloud ComputingZheng Yan0https://orcid.org/0000-0002-9697-2108Xixun Yu1Wenxiu Ding2State Key Laboratory on Integrated Services Networks, Xidian University, Xi’an, ChinaState Key Laboratory on Integrated Services Networks, Xidian University, Xi’an, ChinaState Key Laboratory on Integrated Services Networks, Xidian University, Xi’an, ChinaInternet of Things (IoTs) has emerged to motivate various intelligent applications based on the data collected by various “things.” Cloud computing plays an important role for big data processing by providing data computing and processing services. However, cloud service providers may invade data privacy and provide inaccurate data processing results to users, and thus cannot be fully trusted. On the other hand, limited by computation resources and capabilities, cloud users mostly cannot independently process big data and perform verification on the correctness of data processing. This raises a special challenge on cloud computing verification, especially when user data are stored at the cloud in an encrypted form and processed for satisfying the requests raised in different contexts. But the current literature still lacks serious studies on this research issue. In this paper, we propose a context-aware verifiable computing scheme based on full homomorphic encryption by deploying an auditing protocol to verify the correctness of the encrypted data processing result. We design four optional auditing protocols to satisfy different security requirements. Their performance is evaluated and compared through performance analysis, algorithm implementation, and system simulation. The results show the effectiveness and efficiency of our designs. The pros and cons of all protocols are also analyzed and discussed based on rigorous comparison.https://ieeexplore.ieee.org/document/7849191/Cloud computingfull homomorphic encryptionprivacy protectionverifiable cloud computing |
spellingShingle | Zheng Yan Xixun Yu Wenxiu Ding Context-Aware Verifiable Cloud Computing IEEE Access Cloud computing full homomorphic encryption privacy protection verifiable cloud computing |
title | Context-Aware Verifiable Cloud Computing |
title_full | Context-Aware Verifiable Cloud Computing |
title_fullStr | Context-Aware Verifiable Cloud Computing |
title_full_unstemmed | Context-Aware Verifiable Cloud Computing |
title_short | Context-Aware Verifiable Cloud Computing |
title_sort | context aware verifiable cloud computing |
topic | Cloud computing full homomorphic encryption privacy protection verifiable cloud computing |
url | https://ieeexplore.ieee.org/document/7849191/ |
work_keys_str_mv | AT zhengyan contextawareverifiablecloudcomputing AT xixunyu contextawareverifiablecloudcomputing AT wenxiuding contextawareverifiablecloudcomputing |