Skip to main content

Publicly Verifiable 1-norm and 2-norm Operations over Outsourced Data Stream Under Single-Key Setting

  • Conference paper
  • First Online:
Advances in Internet, Data & Web Technologies (EIDWT 2018)

Abstract

With the advent of the big data era, the amount of data computation is getting larger and larger, and the computational load of clients is also increasing day by day. The advent of clouds allows clients to outsource their data to the cloud for computing services. Outsourced computation has greatly reduced the computational burden of clients, but also brings the issue of trust. Because the cloud is not trustworthy, clients need to verify the correctness of the remote computation results. In this paper, we mainly study the common norm operations, and propose two publicly verifiable schemes for 1-norm and 2-norm operations respectively, any client can publicly verify these two common norm operations under single-key setting by using our schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sun, W., Liu, X., Lou, W., Hou, Y.T., Li, H.: Catch you if you lie to me: efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 2110–2118. IEEE (2015)

    Google Scholar 

  2. Liu, X., Zhang, Y., Wang, B., Yan, J.: Mona: secure multiowner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1182–1191 (2013)

    Article  Google Scholar 

  3. Gordon, S.D., Katz, J., Liu, F.-H., Shi, E., Zhou, H.-S.: Multi-client verifiable computation with stronger security guarantees. In: Theory of Cryptography, pp. 144–168. Springer (2015)

    Google Scholar 

  4. Nath, S., Venkatesan, R.: Publicly verifiable grouped aggregation queries on outsourced data streams. In: International Conference on Data Engineering, pp. 517–528. IEEE (2013)

    Google Scholar 

  5. Gennaro, R., Wichs, D.: Fully homomorphic message authenticators. In: Advances in Cryptology-ASIACRYPT, pp. 301–320. Springer (2013)

    Google Scholar 

  6. Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Advances in Cryptology–CRYPTO, pp. 465–482. Springer (2010)

    Google Scholar 

  7. Thaler, J.R.: Practical verified computation with streaming interactive proofs. Ph.D. dissertation, Harvard University (2013)

    Google Scholar 

  8. Vu, V., Setty, S., Blumberg, A.J., Walfish, M.: A hybrid architecture for interactive verifiable computation. In: IEEE Symposium on Security and Privacy, pp. 223–237. IEEE (2013)

    Google Scholar 

  9. Papadopoulos, S., Cormode, G., Deligiannakis, A., Garofalakis, M.: Lightweight authentication of linear algebraic queries on data streams. In: International Conference on Management of Data, pp. 881–892. ACM (2013)

    Google Scholar 

  10. Chen, Z.: Introduction to Matrix. Beijing University of Aeronautics and Astronautics Press, Beijing (2012)

    Google Scholar 

  11. Xu, Z.: Matrix Theory Concise Tutorial. Science Press (2014)

    Google Scholar 

  12. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theor. 22(6), 644–654 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  13. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Advances in CryptologyłCRYPTO 2001, pp. 213–229. Springer (2001)

    Google Scholar 

  14. Liu, X., Sun, W., Quan, H., Lou, W., Zhang, Y., Li, H.: Publicly verifiable inner product evaluation over outsourced data streams under multiple keys. IEEE Trans. Serv. Comput. https://doi.org/10.1109/tsc.2016.2531665

Download references

Acknowledgments

we are writing this few lines to express our sincere appreciation to all the reviewers and editors for their valuable comments and works. This paper is supported by National Natural Science Foundation of China (Grant Nos. 61772550, U1636114, 61572521), National Key Research and Development Program of China (Grant No. 2017YFB0802000), Natural Science Basic Research Plan in Shaanxi Province of China (Grant Nos. 2016JQ6037).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xu An Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liu, Y., Wang, X.A., Sangaiah, A.K., Shao, H. (2018). Publicly Verifiable 1-norm and 2-norm Operations over Outsourced Data Stream Under Single-Key Setting. In: Barolli, L., Xhafa, F., Javaid, N., Spaho, E., Kolici, V. (eds) Advances in Internet, Data & Web Technologies. EIDWT 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 17. Springer, Cham. https://doi.org/10.1007/978-3-319-75928-9_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-75928-9_41

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-75927-2

  • Online ISBN: 978-3-319-75928-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics