Abstract
The volume of data are increasing continuously due to daily transactions, social networks, data automation etc. Managing of large amount data locally is a big challenge and therefore, the people are planned to outsource the data in to third-party server which decrease the cost of storage and local maintenance. Recently, researchers are working hard to securely outsource the data into the cloud server. There is increasing the computation cost when secure access control defined from the data owner site to the third-party server. It will be more effective for the light weight devices also when the computation outsourced through third-party server like data outsourcing in the cloud. In this paper, we proposed a novel process for computation outsourcing into the third party server. Here, we basically worked on a bilinear pairing which is costly computation operation, mostly used in recent security purpose and outsourced those pairing computation into the cloud.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Debnath, S., Bhuyan, B.: Efficient and scalable outsourced data access control with user revocation in cloud: a comprehensive study. Multiagent Grid Syst. 14(4), 383–401 (2018)
Debnath, S., Nunsanga, M., Bhuyan, B.: Study and scope of signcryption for cloud data access control. In: Biswas, U., Banerjee, A., Pal, S., Biswas, A., Sarkar, D., Haldar, S. (eds.) Advances in Computer, Communication and Control. Lecture Notes in Networks and Systems, vol. 41, pp. 113–126. Springer, Singapore (2019)
Benjamin, D., Atallah, M.J.: Private and cheating-free outsourcing of algebraic computations. In: 2008 Sixth Annual Conference on Privacy, Security and Trust, pp. 240–245. IEEE (2008)
Setty, S., McPherson, R., Blumberg, A.J., Walfish, M.: Making argument systems for outsourced computation practical (sometimes) (2012)
Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., Molina, J.: Controlling data in the cloud: outsourcing computation without outsourcing control. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 85–90. ACM, November 2009
Debnath, S., Sahana, S., Bhuyan, B.: A distributed fine-grained access control mechanism over cloud data outsourcing. Sci. Technol. J. 3, 188–197 (2015)
Yu, X.Y., Zheng, Y., Zhang, R.: Verifiable outsourced computation over encrypted data. Inf. Sci. 479, 372–385 (2019)
Kumar, M., Vardhan, M.: Secure and verifiable outsourcing algorithm for large-scale matrix multiplication on public cloud server. In: Ray, K., Sharan, S., Rawat, S., Jain, S., Srivastava, S., Bandyopadhyay, A. (eds.) Engineering Vibration, Communication and Information Processing. Lecture Notes in Electrical Engineering, vol. 478, pp. 575–586. Springer, Singapore (2019)
Rao, Sudarsan, V., Satyanarayana, N.: A secure and efficient computation outsourcing scheme for multi-users. In: International Conference on Advances in Computing and Data Sciences, pp. 12–24. Springer, Singapore (2018)
Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Annual Cryptology Conference 2010, 15 August, pp. 465–482. Springer, Heidelberg (2010)
Wang, C., Ren, K., Wang, J.: Secure and practical outsourcing of linear programming in cloud computing. In: 2011 Proceedings IEEE INFOCOM, pp. 820–828. IEEE, April 2011
Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: USENIX Security Symposium, vol. 2011, no. 3, August 2011
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Eurocrypt, vol. 3494, pp. 457–473. Springer (2005)
Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Annual International Cryptology conference, pp.213–229. Springer (2001)
Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and communications security, pp. 89–98. ACM, New York (2006)
Backes, M., Fiore, D., Reischuk, R.M.: Verifiable delegation of computation on outsourced data. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, pp. 863–874, Berlin, Germany, November 2013
Rao, Y.S., Dutta, R.: Decentralized ciphertext-policy attribute-based encryption scheme with fast decryption. In: IFIP International Conference on Communications and Multimedia Security. Springer, Heidelberg (2013)
Yu, X., Yan, Z., Vasilakos, V.A.: A survey of verifiable computation. Mobile Netw. Appl. 22(3), 438–453 (2017)
Rao, V.S., Satyanarayana, N.: A secure and efficient computation outsourcing scheme for multi-users. In: International Conference on Advances in Computing and Data Sciences, pp. 12–24. Springer, Singapore (2018)
Debnath, S., Bhuyan, B.: Large universe attribute based encryption enabled secured data access control for cloud storage with computation outsourcing. Multiagent Grid Syst. 15(2), 99–119 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Debnath, S., Bhuyan, B. (2020). An Efficient Computation and Storage Outsourcing Process with Verification for Light Weight Devices. In: Dawn, S., Balas, V., Esposito, A., Gope, S. (eds) Intelligent Techniques and Applications in Science and Technology. ICIMSAT 2019. Learning and Analytics in Intelligent Systems, vol 12. Springer, Cham. https://doi.org/10.1007/978-3-030-42363-6_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-42363-6_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-42362-9
Online ISBN: 978-3-030-42363-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)