Secure Outsourcing Algorithm of Polynomials in Cloud Computing

نویسندگان

  • Xianlin Zhou
  • Yong Ding
  • Zhao Wang
  • Xiumin Li
  • Jun Ye
  • Zheng Xu
چکیده

In the era of information explosion, people have to deal with huge amount of data. It is a great computation burden for the resourceconstrained clients. Cloud computing connects large amounts of network resources, and forms a vast pool of resources. It provides much convenience for people. Clients can outsource the complex computation task to the powerful cloud server. In this way, the computation burden of clients can be greatly reduced. In this paper a new algorithm of secure outsourcing for polynomials is proposed. In the computation process, the computation polynomial is hidden to cloud server, and the inputs and outputs of polynomials will not revealed. In addition, clients can verify the result easily. Keywords– Secure Outsourcing; Cloud Computing; Polynomial

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

An Approach Secret Sharing Algorithm in Cloud Computing Security over Single to Multi Cloud

These days rapid use of cloud computing in several IT industries and organizations offers new software at a reasonable cost. Cloud computing is an emerging technology that is at the top in the IT industry. Data is used, processed and stored in cloud environment all over the world. With, this there is unlimited benefits but the security risks are alarming in cloud computing environment. One of t...

متن کامل

Task Scheduling Algorithm Using Covariance Matrix Adaptation Evolution Strategy (CMA-ES) in Cloud Computing

The cloud computing is considered as a computational model which provides the uses requests with resources upon any demand and needs.The need for planning the scheduling of the user's jobs has emerged as an important challenge in the field of cloud computing. It is mainly due to several reasons, including ever-increasing advancements of information technology and an increase of applications and...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations

Outsourcing paradigm is one of the most attractive benefits of cloud computing, where computation workloads can be outsourced to cloud servers by the resourceconstrained devices, such as RFID tags. With this paradigm, cloud users can avoid setting up their own infrastructures. As a result, some new challenges, such as security and checkability, are inevitably introduced. In this paper, we addre...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016