期刊
IEEE TRANSACTIONS ON SERVICES COMPUTING
卷 14, 期 2, 页码 386-399出版社
IEEE COMPUTER SOC
DOI: 10.1109/TSC.2018.2814991
关键词
Outsourcing; Security; Cloud computing; Task analysis; Servers; Mathematical model; Linear programming; Cloud computing; computation outsourcing; security; efficiency; cost-awareness
资金
- US National Science Foundation [CNS:1524520]
The study investigates the outsourcing of computational tasks, proposing affine mapping based schemes to prevent the cloud from accessing key information and limiting the overhead for the transformation. Cost-aware schemes are designed to balance the trade-offs between security demands and computational overhead, with a verification mechanism to ensure valid solutions for end-users. Extensive analysis shows the Cost-Aware Secure Outsourcing scheme is practical and effective.
Computation outsourcing is an integral part of cloud computing. It enables end-users to outsource their computational tasks to the cloud and utilize the shared cloud resources in a pay-per-use manner. However, once the tasks are outsourced, the end-users will lose control of their data, which may result in severe security issues especially when the data is sensitive. To address this problem, secure outsourcing mechanisms have been proposed to ensure security of the end-users' outsourced data. In this paper, we investigate outsourcing of general computational problems which constitute the mathematical basics for problems emerged from various fields such as engineering and finance. To be specific, we propose affine mapping based schemes for the problem transformation and outsourcing so that the cloud is unable to learn any key information from the transformed problem. Meanwhile, the overhead for the transformation is limited to an acceptable level compared to the computational savings introduced by the outsourcing itself. Furthermore, we develop cost-aware schemes to balance the trade-offs between end-users' various security demands and computational overhead. We also propose a verification scheme to ensure that the end-users will always receive a valid solution from the cloud. Our extensive complexity and security analysis show that our proposed Cost-Aware Secure Outsourcing (CASO) scheme is both practical and effective.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据