SEVCOD: secure and efficient verifiable computation on outsourced data

被引:0
|
作者
Chakraborty, Partha Sarathi [1 ]
Gavhane, Omkar Santosh [1 ]
Tripathy, Somanath [1 ]
机构
[1] Indian Inst Technol Patna, Patna 801106, Bihar, India
关键词
Outsourced data; Outsourced computation; Verifiable computing; Encrypted data; Polynomial factorization;
D O I
10.1007/s10586-023-04190-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has gained significant popularity, as a promising service platform in recent years. It facilitates the users to offload their resource-intensive computations to cloud server (CS) for efficient processing. Meanwhile, users prioritize the security and privacy of their sensitive data by encrypting it before outsourcing it to the CS. However, performing computations like multivariate polynomial function over encrypted data and verifying their correctness poses a major challenge. Homomorphic Encryption (HE) has been proposed as a solution to enable computations over encrypted data while maintaining data confidentiality. This work proposes a secure and efficient scheme for verifiable computation on outsourced data, named SEVCOD. SEVCOD combines the power of multivariate polynomial factorization and homomorphic encryption to enable public verification of CS's computation results preserving confidentiality of both data and result. The effectiveness of our scheme is validated through security proofs and performance analysis. The result analysis demonstrates that, SEVCOD significantly reduces computational burden for verifiers and enhances the overall efficiency of the outsourced computation process.
引用
收藏
页码:4725 / 4739
页数:15
相关论文
共 50 条
  • [1] Verifiable Computation on Outsourced Encrypted Data
    Lai, Junzuo
    Deng, Robert H.
    Pang, Hweehwa
    Weng, Jian
    [J]. COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 273 - 291
  • [2] Batch Verifiable Computation of Polynomials on Outsourced Data
    Zhang, Liang Feng
    Safavi-Naini, Reihaneh
    [J]. COMPUTER SECURITY - ESORICS 2015, PT II, 2015, 9327 : 167 - 185
  • [3] Verifiable outsourced computation over encrypted data
    Yu, Xixun
    Yan, Zheng
    Zhang, Rui
    [J]. INFORMATION SCIENCES, 2019, 479 : 372 - 385
  • [4] Efficient RAM and Control Flow in Verifiable Outsourced Computation
    Wahby, Riad S.
    Setty, Srinath
    Ren, Zuocheng
    Blumberg, Andrew J.
    Walfish, Michael
    [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [5] Secure and verifiable outsourced data dimension reduction on dynamic data
    Chen, Zhenzhu
    Fu, Anmin
    Deng, Robert H.
    Liu, Ximeng
    Yang, Yang
    Zhang, Yinghui
    [J]. INFORMATION SCIENCES, 2021, 573 : 182 - 193
  • [6] A secure and efficient outsourced computation on data sharing scheme for privacy computing
    Fan, Kai
    Liu, Tingting
    Zhang, Kuan
    Li, Hui
    Yang, Yintang
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 135 : 169 - 176
  • [7] Processing secure, verifiable and efficient SQL over outsourced database
    Xiang, Tao
    Li, Xiaoguo
    Chen, Fei
    Guo, Shangwei
    Yang, Yuanyuan
    [J]. INFORMATION SCIENCES, 2016, 348 : 163 - 178
  • [8] ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database
    Wu, Songrui
    Li, Qi
    Li, Guoliang
    Yuan, Dong
    Yuan, Xingliang
    Wang, Cong
    [J]. 2019 IEEE 35TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2019), 2019, : 626 - 637
  • [9] Verifiable Outsourced Computation: A Survey
    Gennaro, Rosario
    [J]. PROCEEDINGS OF THE ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING (PODC'17), 2017, : 313 - 313
  • [10] Multi-Client Verifiable Computation Service for Outsourced Data
    Wu, Ying
    Zhang, Rui
    Xue, Rui
    Liu, Ling
    [J]. 2017 IEEE 24TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2017), 2017, : 556 - 563