Verifiable Local Computation on Distributed Data

被引:6
|
作者
Zhang, Liang Feng [1 ]
Safavi-Naini, Reihaneh [1 ]
Liu, Xiao Wei [1 ]
机构
[1] Univ Calgary, Dept Comp Sci, Calgary, AB, Canada
关键词
Cloud storage; delegation of computation; data privacy; computation integrity;
D O I
10.1145/2600075.2600083
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Outsourcing of storage and computation from a resource restricted client to a powerful cloud raises many security issues such as the privacy of the data and the integrity of any delegated computation on the outsourced data. While many techniques have been introduced to protect the client's data privacy or computation integrity, achieving both of them is challenging. In this paper, we propose a multi-server verifiable local computation (VLC) model where the client can privately outsource data blocks m = (ml,, m) to cloud servers and later verify computations on any portion of the outsourced data. We propose two constructions of multi-server VLC schemes. Our schemes achieve data privacy in the sense that no collusion of a subset (size less than a threshold) of the cloud servers can learn any information about m; and computation integrity in the sense that no collusion of a subset (size less than a threshold) of the cloud servers can cause the client to accept their incorrect answers. Our first construction is solely based on PRF and very efficient; our second construction uses bilinear maps and achieves amortized closed-form efficiency over multiple computations of a function.
引用
收藏
页码:3 / 10
页数:8
相关论文
共 50 条
  • [1] A UNIVERSAL PROBLEM IN SECURE AND VERIFIABLE DISTRIBUTED COMPUTATION
    HUANG, MDA
    TENG, SH
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 403 : 336 - 352
  • [2] Efficiently Verifiable Computation on Encrypted Data
    Fiore, Dario
    Gennaro, Rosario
    Pastro, Valerio
    [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 844 - 855
  • [3] Verifiable Computation on Outsourced Encrypted Data
    Lai, Junzuo
    Deng, Robert H.
    Pang, Hweehwa
    Weng, Jian
    [J]. COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 273 - 291
  • [4] Batch Verifiable Computation of Polynomials on Outsourced Data
    Zhang, Liang Feng
    Safavi-Naini, Reihaneh
    [J]. COMPUTER SECURITY - ESORICS 2015, PT II, 2015, 9327 : 167 - 185
  • [5] Verifiable outsourced computation over encrypted data
    Yu, Xixun
    Yan, Zheng
    Zhang, Rui
    [J]. INFORMATION SCIENCES, 2019, 479 : 372 - 385
  • [6] Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation
    Schoenmakers, Berry
    Veeningen, Meilof
    de Vreede, Niels
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 346 - 366
  • [7] SEVCOD: secure and efficient verifiable computation on outsourced data
    Chakraborty, Partha Sarathi
    Gavhane, Omkar Santosh
    Tripathy, Somanath
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (04): : 4725 - 4739
  • [8] A Survey of Verifiable Computation
    Yu, Xixun
    Yan, Zheng
    Vasilakos, Athanasios V.
    [J]. MOBILE NETWORKS & APPLICATIONS, 2017, 22 (03): : 438 - 453
  • [9] A Survey of Verifiable Computation
    Xixun Yu
    Zheng Yan
    Athanasios V. Vasilakos
    [J]. Mobile Networks and Applications, 2017, 22 : 438 - 453
  • [10] Multi-Client Verifiable Computation Service for Outsourced Data
    Wu, Ying
    Zhang, Rui
    Xue, Rui
    Liu, Ling
    [J]. 2017 IEEE 24TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2017), 2017, : 556 - 563