Context-Aware Verifiable Cloud Computing

Internet of Things (IoTs) has emerged to motivate various intelligent applications based on the data collected by various “things.” Cloud computing plays an important role for big data processing by providing data computing and processing services. However, cloud service provid...

Full description

Bibliographic Details
Main Authors: Zheng Yan, Xixun Yu, Wenxiu Ding
Format: Article
Language:English
Published: IEEE 2017-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/7849191/
_version_ 1818556835475488768
author Zheng Yan
Xixun Yu
Wenxiu Ding
author_facet Zheng Yan
Xixun Yu
Wenxiu Ding
author_sort Zheng Yan
collection DOAJ
description Internet of Things (IoTs) has emerged to motivate various intelligent applications based on the data collected by various “things.” Cloud computing plays an important role for big data processing by providing data computing and processing services. However, cloud service providers may invade data privacy and provide inaccurate data processing results to users, and thus cannot be fully trusted. On the other hand, limited by computation resources and capabilities, cloud users mostly cannot independently process big data and perform verification on the correctness of data processing. This raises a special challenge on cloud computing verification, especially when user data are stored at the cloud in an encrypted form and processed for satisfying the requests raised in different contexts. But the current literature still lacks serious studies on this research issue. In this paper, we propose a context-aware verifiable computing scheme based on full homomorphic encryption by deploying an auditing protocol to verify the correctness of the encrypted data processing result. We design four optional auditing protocols to satisfy different security requirements. Their performance is evaluated and compared through performance analysis, algorithm implementation, and system simulation. The results show the effectiveness and efficiency of our designs. The pros and cons of all protocols are also analyzed and discussed based on rigorous comparison.
first_indexed 2024-12-13T23:52:22Z
format Article
id doaj.art-4ed1d8cf946448f2aa8abe5f96926645
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-13T23:52:22Z
publishDate 2017-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-4ed1d8cf946448f2aa8abe5f969266452022-12-21T23:26:43ZengIEEEIEEE Access2169-35362017-01-0152211222710.1109/ACCESS.2017.26668397849191Context-Aware Verifiable Cloud ComputingZheng Yan0https://orcid.org/0000-0002-9697-2108Xixun Yu1Wenxiu Ding2State Key Laboratory on Integrated Services Networks, Xidian University, Xi’an, ChinaState Key Laboratory on Integrated Services Networks, Xidian University, Xi’an, ChinaState Key Laboratory on Integrated Services Networks, Xidian University, Xi’an, ChinaInternet of Things (IoTs) has emerged to motivate various intelligent applications based on the data collected by various “things.” Cloud computing plays an important role for big data processing by providing data computing and processing services. However, cloud service providers may invade data privacy and provide inaccurate data processing results to users, and thus cannot be fully trusted. On the other hand, limited by computation resources and capabilities, cloud users mostly cannot independently process big data and perform verification on the correctness of data processing. This raises a special challenge on cloud computing verification, especially when user data are stored at the cloud in an encrypted form and processed for satisfying the requests raised in different contexts. But the current literature still lacks serious studies on this research issue. In this paper, we propose a context-aware verifiable computing scheme based on full homomorphic encryption by deploying an auditing protocol to verify the correctness of the encrypted data processing result. We design four optional auditing protocols to satisfy different security requirements. Their performance is evaluated and compared through performance analysis, algorithm implementation, and system simulation. The results show the effectiveness and efficiency of our designs. The pros and cons of all protocols are also analyzed and discussed based on rigorous comparison.https://ieeexplore.ieee.org/document/7849191/Cloud computingfull homomorphic encryptionprivacy protectionverifiable cloud computing
spellingShingle Zheng Yan
Xixun Yu
Wenxiu Ding
Context-Aware Verifiable Cloud Computing
IEEE Access
Cloud computing
full homomorphic encryption
privacy protection
verifiable cloud computing
title Context-Aware Verifiable Cloud Computing
title_full Context-Aware Verifiable Cloud Computing
title_fullStr Context-Aware Verifiable Cloud Computing
title_full_unstemmed Context-Aware Verifiable Cloud Computing
title_short Context-Aware Verifiable Cloud Computing
title_sort context aware verifiable cloud computing
topic Cloud computing
full homomorphic encryption
privacy protection
verifiable cloud computing
url https://ieeexplore.ieee.org/document/7849191/
work_keys_str_mv AT zhengyan contextawareverifiablecloudcomputing
AT xixunyu contextawareverifiablecloudcomputing
AT wenxiuding contextawareverifiablecloudcomputing