• DocumentCode
    47847
  • Title

    Proof-Carrying Cloud Computation: The Case of Convex Optimization

  • Author

    Zhen Xu ; Cong Wang ; Kui Ren ; Lingyu Wang ; Bingsheng Zhang

  • Author_Institution
    Dept. of Comput. Sci. & Eng., State Univ. of New York at Buffalo, Buffalo, NY, USA
  • Volume
    9
  • Issue
    11
  • fYear
    2014
  • fDate
    Nov. 2014
  • Firstpage
    1790
  • Lastpage
    1803
  • Abstract
    Cloud computing offers a great opportunity to bridge the gap between the fast growing computation needs and limited local resources. However, without the adequate trust and strong integrity assurance, it would be difficult to expect clients to completely turn over control of their computation to the cloud. Hence, securing cloud computation becomes an imperative and challenging task, especially in the aspect of integrity verification. To address the challenge, we propose a hassle-free, fixed-rate, and job-based software as a service cloud model along with the integrity verification mechanisms, with particular focus on outsourcing the widely applicable engineering optimization problem, i.e., convex optimization. We aim to construct efficient integrity verification mechanisms using application-specific techniques. Our security design does not require the use of heavy cryptographic tools. Instead, we leverage the inherent structure of the optimization problems and make the computation outsourcing proof-carrying to achieve efficient integrity verification. The proposed design provides substantial computational savings on the client side and introduces marginal overhead on the cloud side. We further prove its correctness and soundness. The extensive experiments under the real cloud environment show our mechanisms ensure strong integrity assurance with high efficiency on both the client and the cloud sides and are readily applicable in current practice.
  • Keywords
    cloud computing; convex programming; cryptography; cloud computation security; cloud computing; convex optimization; cryptographic tools; integrity assurance; integrity verification mechanism; proof-carrying cloud computation; software-as-a-service cloud model; Cloud computing; Computational modeling; Convex functions; Cryptography; Optimization; Outsourcing; Cloud computing; computation outsourcing; convex optimization; security;
  • fLanguage
    English
  • Journal_Title
    Information Forensics and Security, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1556-6013
  • Type

    jour

  • DOI
    10.1109/TIFS.2014.2352457
  • Filename
    6884828