Context-aware Verifiable Cloud Computing

dc.contributorAalto-yliopistofi
dc.contributorAalto Universityen
dc.contributor.authorYan, Zhengen_US
dc.contributor.authorYu, Xixunen_US
dc.contributor.authorDing, Wenxiuen_US
dc.contributor.departmentDepartment of Communications and Networkingen
dc.contributor.organizationXidian Universityen_US
dc.date.accessioned2018-02-09T10:00:33Z
dc.date.available2018-02-09T10:00:33Z
dc.date.issued2017en_US
dc.description.abstractInternet of Things (IoTs) has emerged to motivate various intelligent applications based on the data collected by various 'things.' Cloud computing plays an important role for big data processing by providing data computing and processing services. However, cloud service providers may invade data privacy and provide inaccurate data processing results to users, and thus cannot be fully trusted. On the other hand, limited by computation resources and capabilities, cloud users mostly cannot independently process big data and perform verification on the correctness of data processing. This raises a special challenge on cloud computing verification, especially when user data are stored at the cloud in an encrypted form and processed for satisfying the requests raised in different contexts. But the current literature still lacks serious studies on this research issue. In this paper, we propose a context-aware verifiable computing scheme based on full homomorphic encryption by deploying an auditing protocol to verify the correctness of the encrypted data processing result. We design four optional auditing protocols to satisfy different security requirements. Their performance is evaluated and compared through performance analysis, algorithm implementation, and system simulation. The results show the effectiveness and efficiency of our designs. The pros and cons of all protocols are also analyzed and discussed based on rigorous comparison.en
dc.description.versionPeer revieweden
dc.format.extent17
dc.format.mimetypeapplication/pdfen_US
dc.identifier.citationYan, Z, Yu, X & Ding, W 2017, 'Context-aware Verifiable Cloud Computing', IEEE Access, vol. 5, 7849191, pp. 2211-2227. https://doi.org/10.1109/ACCESS.2017.2666839en
dc.identifier.doi10.1109/ACCESS.2017.2666839en_US
dc.identifier.issn2169-3536
dc.identifier.otherPURE UUID: 7fbe64ca-a6ae-47ca-bc63-267b0ecad099en_US
dc.identifier.otherPURE ITEMURL: https://research.aalto.fi/en/publications/7fbe64ca-a6ae-47ca-bc63-267b0ecad099en_US
dc.identifier.otherPURE LINK: http://www.scopus.com/inward/record.url?scp=85015749227&partnerID=8YFLogxK
dc.identifier.otherPURE FILEURL: https://research.aalto.fi/files/16194844/yan_et_al_IEEEAccess07849191.pdfen_US
dc.identifier.urihttps://aaltodoc.aalto.fi/handle/123456789/29884
dc.identifier.urnURN:NBN:fi:aalto-201802091380
dc.language.isoenen
dc.publisherIEEE
dc.relation.ispartofseriesIEEE Accessen
dc.relation.ispartofseriesVolume 5, pp. 2211-2227en
dc.rightsopenAccessen
dc.rights.copyright© 2017 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
dc.subject.keywordCloud computingen_US
dc.subject.keywordFull homomorphic encryptionen_US
dc.subject.keywordPrivacy protectionen_US
dc.subject.keywordVerifiable cloud computingen_US
dc.titleContext-aware Verifiable Cloud Computingen
dc.typeA1 Alkuperäisartikkeli tieteellisessä aikakauslehdessäfi
dc.type.versionpublishedVersion

Files