Autosoft Journal

Online Manuscript Access


Verifiable Outsourcing of High-Degree Polynomials and its Application in Keyword Search


Authors



Abstract

In big data era, people cannot afford more and more complex computation work due to the constrained computation resources. The high reliability, strong processing capacity, large storage space of cloud computing makes the resource-constrained clients remotely operate the heavy computation task with the help of cloud server. In this paper, a new algorithm for secure outsourcing of high degree polynomials is proposed. We introduce a camouflage technique, which the real polynomial will be disguised to the untrusted cloud server. In addition, the input and output will not be revealed in the computation process and the clients can easily verify the returned result. The application of the secure outsourcing algorithm in keyword search system is also studied. A verification technique for keyword search is generated based on the outsourcing algorithm. The client can easily verify whether the server faithfully implement the search work in the whole ciphertext space. If the server does not implement the search work and returns the client “null” to indicate there is no files with the query keyword, the client can easily verify whether there are some related files in the ciphertext database.


Keywords


Pages

Total Pages: 6
Pages: 41-46

DOI
10.1080/10798587.2016.1267239


Manuscript ViewPdf Subscription required to access this document

Obtain access this manuscript in one of the following ways


Already subscribed?

Need information on obtaining a subscription? Personal and institutional subscriptions are available.

Already an author? Have access via email address?


Published

Volume: 24
Issue: 1
Year: 2018

Cite this document


References

Atallah, Mikhail J. et al. "Secure Outsourcing of Scientific Computations." Trends in Software Engineering (2002): 215-272. Crossref. Web. https://doi.org/10.1016/S0065-2458(01)80019-X

Hu, Chuanping et al. "Semantic Link Network-Based Model for Organizing Multimedia Big Data." IEEE Transactions on Emerging Topics in Computing 2.3 (2014): 376-387. Crossref. Web. https://doi.org/10.1109/TETC.2014.2316525

Xu, Zheng et al. "Crowdsourcing Based Description of Urban Emergency Events Using Social Media Big Data." IEEE Transactions on Cloud Computing (2016): 1-1. Crossref. Web. https://doi.org/10.1109/TCC.2016.2517638

Xu, Zheng et al. "Building Knowledge Base of Urban Emergency Events Based on Crowdsourcing of Social Media." Concurrency and Computation: Practice and Experience 28.15 (2016): 4038-4052. Crossref. Web. https://doi.org/10.1002/cpe.3780

Xu, Zheng et al. "Participatory Sensing-Based Semantic and Spatial Analysis of Urban Emergency Events Using Mobile Social Media." EURASIP Journal on Wireless Communications and Networking 2016.1 (2016): n. pag. Crossref. Web. https://doi.org/10.1186/s13638-016-0553-0

Xu, Zheng et al. "Building the Search Pattern of Web Users Using Conceptual Semantic Space Model." International Journal of Web and Grid Services 12.3 (2016): 328. Crossref. Web. https://doi.org/10.1504/IJWGS.2016.079158

Ye, Jun et al. "Fine-Grained Searchable Encryption in Multi-User Setting." Soft Computing 21.20 (2016): 6201-6212. Crossref. Web. https://doi.org/10.1007/s00500-016-2179-x

Ye, Jun, Zheng Xu, and Yong Ding. "Secure Outsourcing of Modular Exponentiations in Cloud and Cluster Computing." Cluster Computing 19.2 (2016): 811-820. Crossref. Web. https://doi.org/10.1007/s10586-016-0571-z

Ye J. Int. J. Netw. Secur

JOURNAL INFORMATION


ISSN PRINT: 1079-8587
ISSN ONLINE: 2326-005X
DOI PREFIX: 10.31209
10.1080/10798587 with T&F
IMPACT FACTOR: 0.652 (2017/2018)
Journal: 1995-Present




CONTACT INFORMATION


TSI Press
18015 Bullis Hill
San Antonio, TX 78258 USA
PH: 210 479 1022
FAX: 210 479 1048
EMAIL: tsiepress@gmail.com
WEB: http://www.wacong.org/tsi/