Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Survey of Verifiable Computation
The State Key Laboratory on Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi’an.
The State Key Laboratory on Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi’an.
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
2017 (English)In: Mobile Networks and Applications, ISSN 1383-469X, Vol. 22, no 3, 438-453 p.Article in journal (Refereed) Published
Abstract [en]

Internet of Things (IoT) has taken place to motivate various intelligent applications with the data collected by the things”. Meanwhile, Cloud computing offers an efficient and convenient way to store, process and analyze huge amount of data. Because a Cloud Service Provider (CSP) that is employed to store and process user private data is actually not in the trust domains of cloud users, data security becomes a serious issue in cloud computing. One crucial problem in cloud is the cloud data processing result may be incorrect, thus cannot be fully trusted. This calls for research to verify the correctness of data processing at the cloud in order to enhance its trustworthiness, especially for encrypted data processing. At present, various cryptosystems have been proposed to achieve verifiability with different characteristics and quality. However, the literature still lacks a thorough survey to review the current state of art in order to get a comprehensive view of this research field, named verifiable computation. In this paper, we review existing work of verifiable computation by comparing and discussing pros and cons according to performance requirements, highlight open research issues through serious review and analysis and propose a number of research directions in order to guide future research

Place, publisher, year, edition, pages
2017. Vol. 22, no 3, 438-453 p.
National Category
Media and Communication Technology
Research subject
Mobile and Pervasive Computing
Identifiers
URN: urn:nbn:se:ltu:diva-63333DOI: 10.1007/s11036-017-0872-3ISI: 000403326500011OAI: oai:DiVA.org:ltu-63333DiVA: diva2:1095198
Note

Validerad;2017;Nivå 2;2017-06-12 (andbra)

Available from: 2017-05-12 Created: 2017-05-12 Last updated: 2017-07-07Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full text

Search in DiVA

By author/editor
Vasilakos, Athanasios
By organisation
Computer Science
Media and Communication Technology

Search outside of DiVA

GoogleGoogle Scholar

Altmetric score

Total: 18 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf