• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Shuai, Fu Anmin, Su Mang, Chen Zhenzhu, Sun Yinxia. Secure and Verifiable Protocol for Outsourcing Group Power Exponent to a Single Server[J]. Journal of Computer Research and Development, 2018, 55(11): 2482-2489. DOI: 10.7544/issn1000-1239.2018.20170420
Citation: Li Shuai, Fu Anmin, Su Mang, Chen Zhenzhu, Sun Yinxia. Secure and Verifiable Protocol for Outsourcing Group Power Exponent to a Single Server[J]. Journal of Computer Research and Development, 2018, 55(11): 2482-2489. DOI: 10.7544/issn1000-1239.2018.20170420

Secure and Verifiable Protocol for Outsourcing Group Power Exponent to a Single Server

More Information
  • Published Date: October 31, 2018
  • With the rapid development of cloud computing and the arrival of large data age, users are confronted with huge data and information to be processed which means massive amounts of difficult tasks. Consequently, how to securely outsource some time-consuming computing tasks to an untrusted public cloud server has aroused widespread concern. To realize the data privacy protection and the verifiability of calculation results in outsourcing computing, based on the single server model, this paper proposes a new privacy-preserving protocol for outsourcing power exponent on a group field, called GEXP(outsourcing power exponent on a group field). The scheme can prevent adversaries from getting any input/output data. Moreover, it effectively avoids the collusion attack in the dual server model. Compared with the existing schemes, GEXP can detect the wrong result returned by the cloud server with 100% probability, which ensures that the user can fully verify the result of outsourcing calculation. The formal security analysis and experiments indicate that our scheme is to protect privacy and highly efficient. In experiments, we compare our scheme with other state-of-the-art schemes to further demonstrate the superiorities in security and efficiency. In addition, in order to prove the practicality of our scheme, this paper gives the specific application of GEXP in cloud storage data integrity verification.
  • Related Articles

    [1]Wang Bin, Zhang Lei, Zhang Guoyin. A Gradual Sensitive Indistinguishable Based Location Privacy Protection Scheme[J]. Journal of Computer Research and Development, 2020, 57(3): 616-630. DOI: 10.7544/issn1000-1239.2020.20190086
    [2]Zeng Ji, ian, Wang Tian, Jia Weijia, Peng Shaoliang. A Survey on Sensor-Cloud[J]. Journal of Computer Research and Development, 2017, 54(5): 925-939. DOI: 10.7544/issn1000-1239.2017.20160492
    [3]Ren Lifang, Wang Wenjian, Xu Hang. Uncertainty-Aware Adaptive Service Composition in Cloud Computing[J]. Journal of Computer Research and Development, 2016, 53(12): 2867-2881. DOI: 10.7544/issn1000-1239.2016.20150078
    [4]Liu Bingyi, Wu Libing, Jia Dongyao, Nie Lei, Ye Luyao, Wang Jianping. Data Uplink Strategy in Mobile Cloud Service Based Vehicular Ad Hoc Network[J]. Journal of Computer Research and Development, 2016, 53(4): 811-823. DOI: 10.7544/issn1000-1239.2016.20151150
    [5]Zhou Changli, Ma Chunguang, Yang Songtao. Location Privacy-Preserving Method for LBS Continuous KNN Query in Road Networks[J]. Journal of Computer Research and Development, 2015, 52(11): 2628-2644. DOI: 10.7544/issn1000-1239.2015.20140532
    [6]Li Jiguo, Shi Yuerong, Zhang Yichen. A Privacy Preserving Attribute-Based Encryption Scheme with User Revocation[J]. Journal of Computer Research and Development, 2015, 52(10): 2281-2292. DOI: 10.7544/issn1000-1239.2015.20150580
    [7]Li Hui, Sun Wenhai, Li Fenghua, Wang Boyang. Secure and Privacy-Preserving Data Storage Service in Public Cloud[J]. Journal of Computer Research and Development, 2014, 51(7): 1397-1409.
    [8]Lü Xiaobo, Guo Yao, and Chen Xiangqun. A Splitting-Based Cloud Storage Mechanism for Digital Images[J]. Journal of Computer Research and Development, 2014, 51(5): 1129-1135.
    [9]Pan Xiao, Hao Xing, and Meng Xiaofeng. Privacy Preserving Towards Continuous Query in Location-Based Services[J]. Journal of Computer Research and Development, 2010, 47(1): 121-129.
    [10]Xu Mingwei, Hu Chunming, Liu Xudong, and Ma Dianfu. Research and Implementation of Web Service Differentiated QoS[J]. Journal of Computer Research and Development, 2005, 42(4): 669-675.

Catalog

    Article views (1191) PDF downloads (472) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return