Abstract
With the advent of the big data era, the amount of data computation is getting larger and larger, and the computational load of clients is also increasing day by day. The advent of clouds allows clients to outsource their data to the cloud for computing services. Outsourced computation has greatly reduced the computational burden of clients, but also brings the issue of trust. Because the cloud is not trustworthy, clients need to verify the correctness of the remote computation results. In this paper, we mainly study the common norm operations, and propose two publicly verifiable schemes for 1-norm and 2-norm operations respectively, any client can publicly verify these two common norm operations under single-key setting by using our schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sun, W., Liu, X., Lou, W., Hou, Y.T., Li, H.: Catch you if you lie to me: efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 2110–2118. IEEE (2015)
Liu, X., Zhang, Y., Wang, B., Yan, J.: Mona: secure multiowner data sharing for dynamic groups in the cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1182–1191 (2013)
Gordon, S.D., Katz, J., Liu, F.-H., Shi, E., Zhou, H.-S.: Multi-client verifiable computation with stronger security guarantees. In: Theory of Cryptography, pp. 144–168. Springer (2015)
Nath, S., Venkatesan, R.: Publicly verifiable grouped aggregation queries on outsourced data streams. In: International Conference on Data Engineering, pp. 517–528. IEEE (2013)
Gennaro, R., Wichs, D.: Fully homomorphic message authenticators. In: Advances in Cryptology-ASIACRYPT, pp. 301–320. Springer (2013)
Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Advances in Cryptology–CRYPTO, pp. 465–482. Springer (2010)
Thaler, J.R.: Practical verified computation with streaming interactive proofs. Ph.D. dissertation, Harvard University (2013)
Vu, V., Setty, S., Blumberg, A.J., Walfish, M.: A hybrid architecture for interactive verifiable computation. In: IEEE Symposium on Security and Privacy, pp. 223–237. IEEE (2013)
Papadopoulos, S., Cormode, G., Deligiannakis, A., Garofalakis, M.: Lightweight authentication of linear algebraic queries on data streams. In: International Conference on Management of Data, pp. 881–892. ACM (2013)
Chen, Z.: Introduction to Matrix. Beijing University of Aeronautics and Astronautics Press, Beijing (2012)
Xu, Z.: Matrix Theory Concise Tutorial. Science Press (2014)
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theor. 22(6), 644–654 (1976)
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Advances in CryptologyłCRYPTO 2001, pp. 213–229. Springer (2001)
Liu, X., Sun, W., Quan, H., Lou, W., Zhang, Y., Li, H.: Publicly verifiable inner product evaluation over outsourced data streams under multiple keys. IEEE Trans. Serv. Comput. https://doi.org/10.1109/tsc.2016.2531665
Acknowledgments
we are writing this few lines to express our sincere appreciation to all the reviewers and editors for their valuable comments and works. This paper is supported by National Natural Science Foundation of China (Grant Nos. 61772550, U1636114, 61572521), National Key Research and Development Program of China (Grant No. 2017YFB0802000), Natural Science Basic Research Plan in Shaanxi Province of China (Grant Nos. 2016JQ6037).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Liu, Y., Wang, X.A., Sangaiah, A.K., Shao, H. (2018). Publicly Verifiable 1-norm and 2-norm Operations over Outsourced Data Stream Under Single-Key Setting. In: Barolli, L., Xhafa, F., Javaid, N., Spaho, E., Kolici, V. (eds) Advances in Internet, Data & Web Technologies. EIDWT 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 17. Springer, Cham. https://doi.org/10.1007/978-3-319-75928-9_41
Download citation
DOI: https://doi.org/10.1007/978-3-319-75928-9_41
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-75927-2
Online ISBN: 978-3-319-75928-9
eBook Packages: EngineeringEngineering (R0)