4.7 Article

CASO: Cost-Aware Secure Outsourcing of General Computational Problems

Journal

IEEE TRANSACTIONS ON SERVICES COMPUTING
Volume 14, Issue 2, Pages 386-399

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TSC.2018.2814991

Keywords

Outsourcing; Security; Cloud computing; Task analysis; Servers; Mathematical model; Linear programming; Cloud computing; computation outsourcing; security; efficiency; cost-awareness

Funding

  1. US National Science Foundation [CNS:1524520]

Ask authors/readers for more resources

The study investigates the outsourcing of computational tasks, proposing affine mapping based schemes to prevent the cloud from accessing key information and limiting the overhead for the transformation. Cost-aware schemes are designed to balance the trade-offs between security demands and computational overhead, with a verification mechanism to ensure valid solutions for end-users. Extensive analysis shows the Cost-Aware Secure Outsourcing scheme is practical and effective.
Computation outsourcing is an integral part of cloud computing. It enables end-users to outsource their computational tasks to the cloud and utilize the shared cloud resources in a pay-per-use manner. However, once the tasks are outsourced, the end-users will lose control of their data, which may result in severe security issues especially when the data is sensitive. To address this problem, secure outsourcing mechanisms have been proposed to ensure security of the end-users' outsourced data. In this paper, we investigate outsourcing of general computational problems which constitute the mathematical basics for problems emerged from various fields such as engineering and finance. To be specific, we propose affine mapping based schemes for the problem transformation and outsourcing so that the cloud is unable to learn any key information from the transformed problem. Meanwhile, the overhead for the transformation is limited to an acceptable level compared to the computational savings introduced by the outsourcing itself. Furthermore, we develop cost-aware schemes to balance the trade-offs between end-users' various security demands and computational overhead. We also propose a verification scheme to ensure that the end-users will always receive a valid solution from the cloud. Our extensive complexity and security analysis show that our proposed Cost-Aware Secure Outsourcing (CASO) scheme is both practical and effective.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available