SEVCOD: secure and efficient verifiable computation on outsourced data

被引:0
|
作者
Chakraborty, Partha Sarathi [1 ]
Gavhane, Omkar Santosh [1 ]
Tripathy, Somanath [1 ]
机构
[1] Indian Inst Technol Patna, Patna 801106, Bihar, India
关键词
Outsourced data; Outsourced computation; Verifiable computing; Encrypted data; Polynomial factorization;
D O I
10.1007/s10586-023-04190-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has gained significant popularity, as a promising service platform in recent years. It facilitates the users to offload their resource-intensive computations to cloud server (CS) for efficient processing. Meanwhile, users prioritize the security and privacy of their sensitive data by encrypting it before outsourcing it to the CS. However, performing computations like multivariate polynomial function over encrypted data and verifying their correctness poses a major challenge. Homomorphic Encryption (HE) has been proposed as a solution to enable computations over encrypted data while maintaining data confidentiality. This work proposes a secure and efficient scheme for verifiable computation on outsourced data, named SEVCOD. SEVCOD combines the power of multivariate polynomial factorization and homomorphic encryption to enable public verification of CS's computation results preserving confidentiality of both data and result. The effectiveness of our scheme is validated through security proofs and performance analysis. The result analysis demonstrates that, SEVCOD significantly reduces computational burden for verifiers and enhances the overall efficiency of the outsourced computation process.
引用
收藏
页码:4725 / 4739
页数:15
相关论文
共 50 条
  • [21] Efficient secure and verifiable KNN set similarity search over outsourced clouds
    Jiang, Xufeng
    Li, Lu
    [J]. HIGH-CONFIDENCE COMPUTING, 2023, 3 (01):
  • [22] Towards Verifiable Resource Accounting for Outsourced Computation
    Chen, Chen
    Maniatis, Petros
    Perrig, Adrian
    Vasudevan, Amit
    Sekar, Vyas
    [J]. ACM SIGPLAN NOTICES, 2013, 48 (07) : 167 - 178
  • [23] Efficient and Secure Storage for Outsourced Data: A Survey
    Wang, Jianfeng
    Chen, Xiaofeng
    [J]. DATA SCIENCE AND ENGINEERING, 2016, 1 (03) : 178 - 188
  • [24] Secure Data Storage Operations with Verifiable Outsourced Decryption for Mobile Cloud Computing
    Yadav, Harsh
    Dave, Mayank
    [J]. 2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2014,
  • [25] Towards an efficient and secure computation over outsourced encrypted data using distributed hash table
    Masood R.
    Pandey N.
    Rana Q.P.
    [J]. International Journal of Cloud Computing, 2022, 11 (03): : 217 - 233
  • [26] Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources"
    Wang, Xu An
    Choo, Kim-Kwang Raymond
    Weng, Jian
    Ma, Jianfeng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 1586 - 1588
  • [27] An Efficient Privacy-preserving Approach for Secure Verifiable Outsourced Computing on Untrusted Platforms
    Olakanmi, Oladayo Olufemi
    Dada, Adedamola
    [J]. INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2019, 9 (02) : 79 - 98
  • [28] Secure Computation on Outsourced Data: A 10-year Retrospective
    Haciguemues, Hakan
    Iyer, Bala
    Mehrotra, Sharad
    [J]. DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2014, PT I, 2014, 8421 : 16 - 27
  • [29] Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption
    Jing Li
    Xiong Li
    Licheng Wang
    Debiao He
    Haseeb Ahmad
    Xinxin Niu
    [J]. Soft Computing, 2018, 22 : 707 - 714
  • [30] MD-vcMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication
    Sheng, Gang
    Tang, Chunming
    Gao, Wei
    Yin, Ying
    [J]. NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 349 - 362