Proof-Carrying Cloud Computation: The Case of Convex Optimization

Zhen Xu, Cong Wang, Kui Ren, Lingyu Wang, Bingsheng Zhang

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

17 Citations (Scopus)

Abstract

Cloud computing offers a great opportunity to bridge the gap between the fast growing computation needs and limited local resources. However, without the adequate trust and strong integrity assurance, it would be difficult to expect clients to completely turn over control of their computation to the cloud. Hence, securing cloud computation becomes an imperative and challenging task, especially in the aspect of integrity verification. To address the challenge, we propose a hassle-free, fixed-rate, and job-based software as a service cloud model along with the integrity verification mechanisms, with particular focus on outsourcing the widely applicable engineering optimization problem, i.e., convex optimization. We aim to construct efficient integrity verification mechanisms using application-specific techniques. Our security design does not require the use of heavy cryptographic tools. Instead, we leverage the inherent structure of the optimization problems and make the computation outsourcing proof-carrying to achieve efficient integrity verification. The proposed design provides substantial computational savings on the client side and introduces marginal overhead on the cloud side. We further prove its correctness and soundness. The extensive experiments under the real cloud environment show our mechanisms ensure strong integrity assurance with high efficiency on both the client and the cloud sides and are readily applicable in current practice.
Original languageEnglish
Pages (from-to)1790-1803
JournalIEEE Transactions on Information Forensics and Security
Volume9
Issue number11
Online published27 Aug 2014
DOIs
Publication statusPublished - Nov 2014

Research Keywords

  • Cloud computing
  • computation outsourcing
  • convex optimization
  • security

Fingerprint

Dive into the research topics of 'Proof-Carrying Cloud Computation: The Case of Convex Optimization'. Together they form a unique fingerprint.

Cite this