Proof-Carrying Cloud Computation : The Case of Convex Optimization

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

16 Scopus Citations
View graph of relations


  • Zhen Xu
  • Cong Wang
  • Kui Ren
  • Lingyu Wang
  • Bingsheng Zhang

Related Research Unit(s)


Original languageEnglish
Pages (from-to)1790-1803
Journal / PublicationIEEE Transactions on Information Forensics and Security
Issue number11
Online published27 Aug 2014
Publication statusPublished - Nov 2014


Cloud computing offers a great opportunity to bridge the gap between the fast growing computation needs and limited local resources. However, without the adequate trust and strong integrity assurance, it would be difficult to expect clients to completely turn over control of their computation to the cloud. Hence, securing cloud computation becomes an imperative and challenging task, especially in the aspect of integrity verification. To address the challenge, we propose a hassle-free, fixed-rate, and job-based software as a service cloud model along with the integrity verification mechanisms, with particular focus on outsourcing the widely applicable engineering optimization problem, i.e., convex optimization. We aim to construct efficient integrity verification mechanisms using application-specific techniques. Our security design does not require the use of heavy cryptographic tools. Instead, we leverage the inherent structure of the optimization problems and make the computation outsourcing proof-carrying to achieve efficient integrity verification. The proposed design provides substantial computational savings on the client side and introduces marginal overhead on the cloud side. We further prove its correctness and soundness. The extensive experiments under the real cloud environment show our mechanisms ensure strong integrity assurance with high efficiency on both the client and the cloud sides and are readily applicable in current practice.

Research Area(s)

  • Cloud computing, computation outsourcing, convex optimization, security

Citation Format(s)

Proof-Carrying Cloud Computation: The Case of Convex Optimization. / Xu, Zhen; Wang, Cong; Ren, Kui et al.
In: IEEE Transactions on Information Forensics and Security, Vol. 9, No. 11, 11.2014, p. 1790-1803.

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review