Context-aware Verifiable Cloud Computing

 |  Login

Show simple item record

dc.contributor Aalto-yliopisto fi
dc.contributor Aalto University en
dc.contributor.author Yan, Zheng
dc.contributor.author Yu, Xixun
dc.contributor.author Ding, Wenxiu
dc.date.accessioned 2018-02-09T10:00:33Z
dc.date.available 2018-02-09T10:00:33Z
dc.date.issued 2017
dc.identifier.citation Yan , Z , Yu , X & Ding , W 2017 , ' Context-aware Verifiable Cloud Computing ' IEEE ACCESS , vol 5 , 7849191 , pp. 2211-2227 . DOI: 10.1109/ACCESS.2017.2666839 en
dc.identifier.issn 2169-3536
dc.identifier.other PURE UUID: 7fbe64ca-a6ae-47ca-bc63-267b0ecad099
dc.identifier.other PURE ITEMURL: https://research.aalto.fi/en/publications/contextaware-verifiable-cloud-computing(7fbe64ca-a6ae-47ca-bc63-267b0ecad099).html
dc.identifier.other PURE LINK: http://www.scopus.com/inward/record.url?scp=85015749227&partnerID=8YFLogxK
dc.identifier.other PURE FILEURL: https://research.aalto.fi/files/16194844/yan_et_al_IEEEAccess07849191.pdf
dc.identifier.uri https://aaltodoc.aalto.fi/handle/123456789/29884
dc.description.abstract Internet of Things (IoTs) has emerged to motivate various intelligent applications based on the data collected by various 'things.' Cloud computing plays an important role for big data processing by providing data computing and processing services. However, cloud service providers may invade data privacy and provide inaccurate data processing results to users, and thus cannot be fully trusted. On the other hand, limited by computation resources and capabilities, cloud users mostly cannot independently process big data and perform verification on the correctness of data processing. This raises a special challenge on cloud computing verification, especially when user data are stored at the cloud in an encrypted form and processed for satisfying the requests raised in different contexts. But the current literature still lacks serious studies on this research issue. In this paper, we propose a context-aware verifiable computing scheme based on full homomorphic encryption by deploying an auditing protocol to verify the correctness of the encrypted data processing result. We design four optional auditing protocols to satisfy different security requirements. Their performance is evaluated and compared through performance analysis, algorithm implementation, and system simulation. The results show the effectiveness and efficiency of our designs. The pros and cons of all protocols are also analyzed and discussed based on rigorous comparison. en
dc.format.extent 17
dc.format.extent 2211-2227
dc.format.mimetype application/pdf
dc.language.iso en en
dc.relation.ispartofseries IEEE ACCESS en
dc.relation.ispartofseries Volume 5 en
dc.rights openAccess en
dc.subject.other Computer Science(all) en
dc.subject.other Materials Science(all) en
dc.subject.other Engineering(all) en
dc.subject.other 113 Computer and information sciences en
dc.title Context-aware Verifiable Cloud Computing en
dc.type A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä fi
dc.description.version Peer reviewed en
dc.contributor.department Department of Communications and Networking
dc.contributor.department Xidian University
dc.subject.keyword Cloud computing
dc.subject.keyword Full homomorphic encryption
dc.subject.keyword Privacy protection
dc.subject.keyword Verifiable cloud computing
dc.subject.keyword Computer Science(all)
dc.subject.keyword Materials Science(all)
dc.subject.keyword Engineering(all)
dc.subject.keyword 113 Computer and information sciences
dc.identifier.urn URN:NBN:fi:aalto-201802091380
dc.identifier.doi 10.1109/ACCESS.2017.2666839
dc.type.version publishedVersion


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search archive


Advanced Search

article-iconSubmit a publication

Browse

My Account