Abstract

In the Big Data Era, outsourcing computation has become increasingly significant as it supplies computation resources for clients with limited resources. However, there are still many security challenges such as payment fairness, privacy protection, and verification. In this paper, we propose a secure publicly verifiable outsourcing computation scheme for the large-scale matrix QR decomposition. In the proposed scheme, client can pay for outsourcing services through blockchain-based payment system which achieves the payment fairness. Moreover, to protect privacy, both permutation matrix and block diagonal matrix are applied in encryption process. Meanwhile, to achieve the public verification, the computational complexity is reduced by using the matrix digest technology. It is worth mentioning that our scheme is provable and secure under the co-CDH assumption.

Highlights

  • Cloud computing, a new computing technology and service concept, has appeared in the public’s vision and serves customers in a pay-per-use manner [1,2,3]

  • To realize secure and fair payment of outsourcing services without relying on any third party, fair payment framework based on blockchain has been used for outsourcing services in cloud computing [5]

  • We research on secure outsourcing matrix QR decomposition computation and propose a publicly verifiable scheme based on blockchain. e system consists of two parts: blockchain-based payment and publicly verifiable computation

Read more

Summary

Introduction

A new computing technology and service concept, has appeared in the public’s vision and serves customers in a pay-per-use manner [1,2,3]. We research on secure outsourcing matrix QR decomposition computation and propose a publicly verifiable scheme based on blockchain. We focus on designing publicly verifiable computation scheme and we refer the reader to reference [5] to know more about blockchain-based payment. To protect privacy of clients, researchers have devoted to design the secure outsourcing schemes [9,10,11,12,13,14]. Parno et al [18] gave the concept of the correctness and security which had established a connection between public verification computation and attribute-based encryption (ABE). E scheme in [22] achieved the public verification and protected privacy information of original data, where matrix digest was utilized to reduce the overhead of key generation and cloud computing.

Preliminaries
The Proposed Scheme
Correctness Analysis
Security Analysis
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call