Abstract
Methods for solving equations play an important role in scientific computation and cryptography. Usually, many cryptographic protocols and scientific computation problems can be reduced to some differential equation or linear equation systems. However, the above mentioned scientific computation needs very much computation resource. Hence, super computer technology such as grid technology, cloud computation is slow to emerge. Cloud computation has strong computation power and helps users to deals with this very difficult computation. For security, we need improve some conditional computation methods for numerical or scientific outsourcing computation. In this paper some special algebraic and differential equations are studied. And some new practical verifiably secure outsourcing protocols are designed, which are better than the previous methods in the following terms. First, they can protect more secret parameters for abstract equations. Second, based on previous methods, random function can be chosen in the different ways and hence better security and privacy is obtained. Third, for nonlinear equations, we find more applications and new methods. These tools help us to find more methods to deal with more linear or nonlinear equations. At last, some verifiably secure outsourcing computation for integral computation is designed. These results help to outsource the computation for solving differential equations.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Akimanaa R, Markowitch O, Roggeman Y (2007) Grids confidential outsourcing of string matching. In: The 6th WSEAS int conf on software engineering, parallel and distributed systems, pp 63–68
Atallah M, Pantazopoulos K, Rice J, Spafford E (2001) Secure outsourcing of scientific computations. Adv Comput 54:216–272
Atallah M, Li J (2005) Secure outsourcing of sequence comparisons. Int J Inf Secur 4(4):277–287
Atallah M, Frikken K (2010) Securely outsourcing linear algebra computations. In: Proceedings of ASIACCS. New York, pp 48–59
Atallah M, Pantazopoulos K, Rice J, Spafford E (1996) Secure outsourcing of some computations. Department of Computer Sciences. CSD-TR-96-074, Pudue University
Benjamin D, Atallah M (2008) Private and cheating-free outsourcing of algebraic computations. In: Proceedings of 6th conference on privacy, security, and trust (PST), pp 240–245
Cao T, Mao X, Lin D (2006) Security analysis of a server-aided RSA key generation protocol. In: Lecture notes in computer science. doi:10.1007/11689522-29
Chen Y, Safavi-Naini R, Baek J (2005) Server-aided RSA key generation against collusion attack. In: Secure mobile ad-hoc networks and sensors workshop. Singapore, pp 27–37
Du W, Jia J, Mangal M, Murugesan M (2004) Uncheatable grid computing. In: Proceedings of ICDCS, pp 4–11
Gennaro R, Gentry C, Parno B (2010) Non-interactive verifiable computing: outsourcing computationto untrusted workers. In: Proceedings of CRYPTO10. Santa Barbara, pp 465–482
Gentry C (2010) Computing arbitrary functions of encrypted data. Commun ACM 53(3):97–105
Mell P, Grance T (2010) Draft NIST working definition of cloud computing. Referenced on Jan 23rd, 2010
Modadugu N, Boneh D, Kim M (2000) Generating RSA Keys on a handheld using an untrusted server. In: Proceedings of indocrypt 2000, vol 1977. LNCS, pp 271–282
Seitkulov Y (2012) New methods of secure outsourcing of scientific computations. J Supercomput. doi:10.1007/s11227-012-0809-3
Sun Microsystems, Inc. (2009) Building customer trust in cloud computing with transparent security. White Paper, Sun Microsystems, Inc. 4150 Network Circle
Wang C, Cao N, Li J, Ren K, Lou W (2010) Secure ranked keyword search over encrypted cloud data. In: Proceedings of ICDCS10. Washington, pp 253–262
Wang C, Ren K, Wang J (2011) Secure and practical outsourcing of linear programming in cloudcomputing. In: INFOCOM, 2011 proceedings IEEE, pp 820–828
Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained access control incloud computing. In: Proceedings of IEEE INFOCOM10. San Diego, pp 534–542
Acknowledgments
This work is partially supported by National Natural Science Foundation of China (No. 61202475) and Humanities and Social Science Research Project of the Ministry of Education (11YJCZH039).
Conflict of interest
All the authors (Jianhua Yu, Xueli Wang, Wei Gao) for the submitted paper titled “Improvement and Applications of secure outsourcing of scientific computations” declare that they have no conflict of interest.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yu, J., Wang, X. & Gao, W. Improvement and applications of secure outsourcing of scientific computations. J Ambient Intell Human Comput 6, 763–772 (2015). https://doi.org/10.1007/s12652-015-0280-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-015-0280-0