Filters








712 Hits in 5.0 sec

Revocation in Publicly Verifiable Outsourced Computation [chapter]

James Alderman, Christian Janson, Carlos Cid, Jason Crampton
2015 Lecture Notes in Computer Science  
In this work, we introduce the notion of Revocable Publicly Verifiable Computation (RPVC), where a cheating server is revoked and may not perform future computations (thus incurring a financial penalty  ...  The KDC is an authority over entities in the system and enables revocation.  ...  Further details are available in Appendix A. Revocable Publicly Verifiable Computation We now describe our new notion of PVC, which we call Revocable Publicly Verifiable Computation (RPVC).  ... 
doi:10.1007/978-3-319-16745-9_4 fatcat:ny6ip5mc7nfdbphth4gr5wzx3e

RPVC: A Revocable Publicly Verifiable Computation Solution for Edge Computing

Zi Jiao, Fucai Zhou, Qiang Wang, Jintong Sun
2022 Sensors  
With publicly verifiable computation (PVC) development, users with limited resources prefer to outsource computing tasks to cloud servers.  ...  In addition, dishonest edge servers may reduce resource utilization by returning unreliable results. Therefore, we propose a revocable publicly verifiable computation(RPVC) scheme for edge computing.  ...  Related Works Publicly Verifiable Computation (PVC) Verifiable computing (VC) was proposed to verify the outsource computing results by Gennaro [28] via a boolean circuit in 2010.  ... 
doi:10.3390/s22114012 pmid:35684631 fatcat:wvvl34hdkbdadd57m5ghgwumqq

Publicly Verifiable Outsourced Computation with a Key Distribution Centre [article]

James Alderman, Carlos Cid, Jason Crampton, Christian Janson
2014 arXiv   pre-print
Previous work in this area of Publicly Verifiable Outsourced Computation (PVC) requires a costly pre-processing stage.  ...  Thus, there is a desire for clients to outsource the evaluation of complex functions to a server and to be able to verify that the resulting value is correct.  ...  [8] introduced the idea of Publicly Verifiable Computation (PVC).  ... 
arXiv:1406.5720v1 fatcat:ptml6tyy4fgqhlnyqx772d7mli

Public Integrity Checking for Dynamic Data Sharing among Multi Groups

2016 International Journal of Science and Research (IJSR)  
Multi file auditing is also efficiently supported in our scheme by mechanism of batch auditing. So it reduces the computational/communication cost.  ...  Main issues of multi-user modification is used revocation, here a user can revocate, just delete the user information no need to update the signature, because the data in depend to the user.  ...  To ensure data integrity can be audited publicly, users need to compute signatures on all the blocks in shared data.  ... 
doi:10.21275/v5i5.nov164000 fatcat:dke4i27ccrho7nwlo7cms2vexu

Two Stage Public Auditing for Shared Data with Efficient User Revocation in the Cloud

2015 International Journal of Science and Research (IJSR)  
To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data.  ...  With cloud computing, users can remotely store their data into the cloud and use on-demand high-quality applications by using a shared pool of configurable computing resources by using data outsourcing  ...  user revocation in the cloud.  ... 
doi:10.21275/v4i11.nov151499 fatcat:kq5zbn5r6zbvtcj3yhb5tcpx44

Group User Revocation and Integrity Auditing of Shared Data in Cloud Environment

Pushkar Zagade, Shruti Yadav, Aishwarya Shah, Ravindra Bachate
2015 International Journal of Computer Applications  
The enhancement of cloud computing make storage outsourcing becomes an exceeding trend, which result a secure data auditing a cool topic that emerge in research literature.  ...  A new user can be added into the group and an existing group member can be revoked by preserving privacy including data backup based on vector commitment and verifier-local revocation group signature.  ...  Basically, the value U contains the update information which is needed to compute such values.The problem of verifiable data outsourcing is solved by the primitive of verifiable database with efficient  ... 
doi:10.5120/ijca2015906681 fatcat:iczw55pjezfqjiho4762jxog4e

Proficient Justification of Data Accuracy for Cloud Storage Using Dual Protection

Deepika. N, Durga. P, Gayathri. N, Murugesan. M
2019 International Journal of Scientific Research in Science and Technology  
A novel public verification scheme for cloud storage using in distinguishability obfuscation, which requires a lightweight computation on the auditor and delegate most computation to the cloud.  ...  It makes the clients check whether their outsourced data is kept intact without downloading the whole data. In our system we are using the own auditing based on the token generation.  ...  To ensure data integrity can be audited publicly, users need to compute signatures on all the blocks in shared data.  ... 
doi:10.32628/ijsrst196250 fatcat:4b5txdyby5bbrirnxf2qu47zpu

Integrity Check of Shared Data on Cloud with Various Mechanisms

Sarika Katkade, J. V.
2017 International Journal of Computer Applications  
General Terms Cloud data, Data verifiability and User revocation  ...  Cloud computing is the process and adoption of existing technologies and paradigms.  ...  Public Verifiability All above mentioned techniques in section 2, provides Public verification in case of users share information in group and need to be secret for that group only.  ... 
doi:10.5120/ijca2017912945 fatcat:kfahqjcyuvhnzngjgn3pnme46i

Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation

Tao Jiang, Xiaofeng Chen, Jianfeng Ma
2016 IEEE transactions on computers  
The advent of the cloud computing makes storage outsourcing become a rising trend, which promotes the secure remote data auditing a hot topic that appeared in the research literature.  ...  In this paper, we figure out the collusion attack in the exiting scheme and provide an efficient public integrity auditing scheme with secure group user revocation based on vector commitment and verifier-local  ...  [37] formalized the notion of verifiable computation which allows a client to outsource the computation of an arbitrary function.  ... 
doi:10.1109/tc.2015.2389955 fatcat:bh4qgw44mjd5pjcbwz45kfwupa

Efficient and Secure Group based Collusion Resistant Public Auditing Scheme for Cloud Storage

Smita Chaudhari, Gandharba Swain
2021 International Journal of Advanced Computer Science and Applications  
To reduce this cost, a collusion resistant public auditing scheme with group member revocation is proposed in this paper.  ...  To verify the integrity of outsourced data, proposed scheme uses one of the modern cryptographic technique indistinguishability obfuscation combined with a one-way function which can reduce the verification  ...  To verify the correctness of data, TPA computes π 1 (ξ) and = f 2 (ξ) and verify Prf ≟ (name||{(i, ) iЄI }). C. User Revocation Data owner D can revoke any user because of some reason.  ... 
doi:10.14569/ijacsa.2021.0120356 fatcat:47w5qmuwrrhdvfqrex2wyci5gq

Towards Lightweight Provable Data Possession for Cloud Storage Using Indistinguishability Obfuscation

Smita Chaudhari, Gandharba Swain
2022 IEEE Access  
In this paper, we are trying to explore these issues and lists future research directions in this field.  ...  Provable Data Possession (PDP) is one approach of auditing that can verify the integrity using cryptographic algorithms.  ...  [60] is an efficient MPC scheme with public verifiability. They have come up with a publicly verifiable, secure computation scheme.  ... 
doi:10.1109/access.2022.3159699 fatcat:zdffidmjpfdkbbz5b3u3elnvwy

Survey on Evidence of Retrievability Schemes of Cloud Storage Services for Resource-Strained Devices

2015 International Journal of Science and Research (IJSR)  
To diminish the computational expense at client side amid the trustworthiness confirmation of their information, the idea of public verifiability has been proposed.  ...  Public auditability is a model of outsourcing information uprightness check, which can accomplish productivity and security and survey on different resource-constrained devices for retrievability in cloud  ...  With their system, the identity of the signer on every piece in shared information is kept private from an third party auditor (TPA), who is still ready to publicly verify the integrity of shared information  ... 
doi:10.21275/v4i12.nov152254 fatcat:kjf65rzh4valteuqgk4cuk47ry

Data Security of Dynamic and Robust Role Based Access Control from Multiple Authorities in Cloud Environment

Vikas Nagrale, Mayur Yalij, Ashutosh Kumar
2022 International Journal for Research in Applied Science and Engineering Technology  
Data availability is critical in distributed storage systems, especially when node failures are prevalent in real life.  ...  The experiment analysis has proposed in public as well as private cloud environment.  ...  This revocable multi-authority data access scheme with verifiable outsourced decryption and it is secure and verifiable.  ... 
doi:10.22214/ijraset.2022.42489 fatcat:xe2tsxawwvhfbbiszcl5gzhjyu

Secure Multi-Owner Data Sharing for Dynamic Groups using Proxy-Signature in the Cloud

M. Siva, P. Naga, B. Tarakeswara
2015 International Journal of Computer Applications  
In any case, the administration of the data and services may not be completely dependable on the cloud, as users no longer have physical possession of the outsourced personal data so data integrity protection  ...  Cloud computing offers an economical and efficient solution for sharing data among the cloud users with low support without the weight of neighborhood data storing and upkeep.  ...  efficient user revocation in cloud.  ... 
doi:10.5120/ijca2015907675 fatcat:u22s3kxzpzdlxi3rnmipgozw24

Hybrid Publicly Verifiable Computation [chapter]

James Alderman, Christian Janson, Carlos Cid, Jason Crampton
2016 Lecture Notes in Computer Science  
Publicly Verifiable Outsourced Computation (PVC) allows weak devices to delegate computations to more powerful servers, and to verify the correctness of results.  ...  In this paper, we introduce Hybrid PVC (HPVC) which, with a single setup stage, provides a flexible solution to outsourced computation supporting multiple modes: (i) standard PVC, (ii) PVC with cryptographically  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the US Army Research Laboratory  ... 
doi:10.1007/978-3-319-29485-8_9 fatcat:g7jrn4pxavfxdcv42hz5yobzoq
« Previous Showing results 1 — 15 out of 712 results