Reference Hub17
An Efficient Privacy-preserving Approach for Secure Verifiable Outsourced Computing on Untrusted Platforms

An Efficient Privacy-preserving Approach for Secure Verifiable Outsourced Computing on Untrusted Platforms

Oladayo Olufemi Olakanmi, Adedamola Dada
Copyright: © 2019 |Volume: 9 |Issue: 2 |Pages: 20
ISSN: 2156-1834|EISSN: 2156-1826|EISBN13: 9781522567776|DOI: 10.4018/IJCAC.2019040105
Cite Article Cite Article

MLA

Olakanmi, Oladayo Olufemi, and Adedamola Dada. "An Efficient Privacy-preserving Approach for Secure Verifiable Outsourced Computing on Untrusted Platforms." IJCAC vol.9, no.2 2019: pp.79-98. http://doi.org/10.4018/IJCAC.2019040105

APA

Olakanmi, O. O. & Dada, A. (2019). An Efficient Privacy-preserving Approach for Secure Verifiable Outsourced Computing on Untrusted Platforms. International Journal of Cloud Applications and Computing (IJCAC), 9(2), 79-98. http://doi.org/10.4018/IJCAC.2019040105

Chicago

Olakanmi, Oladayo Olufemi, and Adedamola Dada. "An Efficient Privacy-preserving Approach for Secure Verifiable Outsourced Computing on Untrusted Platforms," International Journal of Cloud Applications and Computing (IJCAC) 9, no.2: 79-98. http://doi.org/10.4018/IJCAC.2019040105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In outsourcing computation models, weak devices (clients) increasingly rely on remote servers (workers) for data storage and computations. However, most of these servers are hackable or untrustworthy, which makes their computation questionable. Therefore, there is need for clients to validate the correctness of the results of their outsourced computations and ensure that servers learn nothing about their clients other than the outputs of their computation. In this work, an efficient privacy preservation validation approach is developed which allows clients to store and outsource their computations to servers in a semi-honest model such that servers' computational results could be validated by clients without re-computing the computation. This article employs a morphism approach for the client to efficiently perform the proof of correctness of its outsourced computation without re-computing the whole computation. A traceable pseudonym is employed by clients to enforce anonymity.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.