Table of Contents Author Guidelines Submit a Manuscript
Wireless Communications and Mobile Computing
Volume 2017 (2017), Article ID 6128437, 11 pages
https://doi.org/10.1155/2017/6128437
Research Article

Scalable and Soundness Verifiable Outsourcing Computation in Marine Mobile Computing

1Department of Computer Science and Technology, East China Normal University, Shanghai, China
2The State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an, China
3College of Information Technology, Shanghai Ocean University, Shanghai, China
4Westone Cryptologic Research Center, Beijing, China

Correspondence should be addressed to Haifeng Qian; nc.ude.unce.sc@naiqfh

Received 29 June 2017; Accepted 13 September 2017; Published 10 December 2017

Academic Editor: Zhipeng Cai

Copyright © 2017 Kai Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. P. M. Mell and T. Grance, Draft nist working definition of cloud computing, vol. 15, 2009. View at Publisher · View at Google Scholar
  2. C. D'Este, P. de Souza, C. Sharman, and S. Allen, “Relocatable, automated cost-benefit analysis for marine sensor network design,” Sensors, vol. 12, no. 3, pp. 2874–2898, 2012. View at Publisher · View at Google Scholar · View at Scopus
  3. L. Yu, H. Shen, K. Sapra, L. Ye, and Z. Cai, “CoRE: Cooperative End-to-End Traffic Redundancy Elimination for Reducing Cloud Bandwidth Cost,” IEEE Transactions on Parallel and Distributed Systems, vol. 28, no. 2, pp. 446–461, 2017. View at Publisher · View at Google Scholar · View at Scopus
  4. D. Huang, “Mobile cloud computing,” in Proceedings of the IEEE COMSOC Multimedia Communications Technical Committee (MMTC) E-Letter, vol. 6, pp. 27–31, 2011.
  5. L. Yu, L. Chen, Z. Cai, H. Shen, Y. Liang, and Y. Pan, “Stochastic Load Balancing for Virtual Resource Management in Datacenters,” IEEE Transactions on Cloud Computing, 2016. View at Publisher · View at Google Scholar
  6. S. Zhang, J. Yu, A. Zhang, L. Yang, and Y. Shu, “Marine vehicle sensor network architecture and protocol designs for ocean observation,” Sensors, vol. 12, no. 1, pp. 373–390, 2012. View at Publisher · View at Google Scholar · View at Scopus
  7. P. Hu, K. Xing, X. Cheng, H. Wei, and H. Zhu, “Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks,” in Proceedings of the 33rd IEEE Conference on Computer Communications, IEEE INFOCOM 2014, pp. 1258–1266, Ontario, Canada, May 2014. View at Publisher · View at Google Scholar · View at Scopus
  8. D. Huang, D. Zhao, L. Wei, Z. Wang, and Y. Du, “Modeling and analysis in marine big data: Advances and challenges,” Mathematical Problems in Engineering, vol. 2015, Article ID 384742, 2015. View at Publisher · View at Google Scholar · View at Scopus
  9. B. Parno, M. Raykova, and V. Vaikuntanathan, “How to delegate and verify in public: verifiable computation from attribute-based encryption,” in Theory of Cryptography, vol. 7194 of Lecture Notes in Computer Science, pp. 422–439, Springer, Berlin, Germany, 2012. View at Publisher · View at Google Scholar
  10. N. Attrapadung and H. Imai, “Dual-policy attribute based encryption,” in Proceedings of the International Conference on Applied Cryptography and Network Security, vol. 5536, pp. 168–185, 2009. View at Publisher · View at Google Scholar · View at Scopus
  11. K. Zhang, L. Wei, X. Li, and H. Qian, “Provably secure dual-mode publicly verifiable computation protocol in marine wireless sensor networks,” in Proceedings of the 12th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2017, vol. 10251, pp. 210–219, Springer International Publishing, Guilin, China, 2017. View at Publisher · View at Google Scholar
  12. B. Applebaum, Y. Ishai, and E. Kushilevitz, “From secrecy to soundness: Efficient verification via secure computation,” in Proceedings of the International colloquium on automata, languages and programming (ICALP), vol. 6198, pp. 152–163, 2010. View at Publisher · View at Google Scholar · View at Scopus
  13. R. Gennaro, C. Gentry, and B. Parno, “Non-interactive verifiable computing: outsourcing computation to untrusted workers,” in Advances in Cryptology-CRYPTO 2010, vol. 6223, pp. 465–482, Springer, Berlin, Germany, 2010. View at Publisher · View at Google Scholar · View at MathSciNet
  14. S. Benabbas, R. Gennaro, and Y. Vahlis, “Verifiable delegation of computation over large datasets,” in Advances in Cryptology-CRYPTO 2011, vol. 6841, pp. 111–131, 2011. View at Publisher · View at Google Scholar · View at MathSciNet
  15. M. Backes, D. Fiore, and R. M. Reischuk, “Verifiable delegation of computation on outsourced data,” in Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, pp. 863–874, Berlin, Germany, November 2013. View at Publisher · View at Google Scholar · View at Scopus
  16. D. Fiore and R. Gennaro, “Publicly verifiable delegation of large polynomials and matrix computations, with applications,” in Proceedings of the ACM Conference on Computer and Communications Security (CCS '12), pp. 501–512, ACM, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  17. K. Zhang, J. Gong, S. Tang et al., “Practical and efficient attribute-based encryption with constant-size ciphertexts in outsourced verifiable computation,” in Proceedings of the 11th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2016, pp. 269–279, Xi'an, China, June 2016. View at Publisher · View at Google Scholar · View at Scopus
  18. Y. Sun, Y. Yu, X. Li, K. Zhang, H. Qian, and Y. Zhou, “Batch verifiable computation with public verifiability for outsourcing polynomials and matrix computations,” in Proceedings of the Part I of Information Security and Privacy - 21st Australasian Conference, ACISP 2016, vol. 9722, pp. 293–309, Springer International Publishing, Melbourne, VIC, Australia, 2016. View at Publisher · View at Google Scholar
  19. K. Chung, Y. T. Kalai, and S. P. Vadhan, “Improved delegation of computation using fully homomorphic encryption,” in in Proceedings of CRYPTO, 2010, pp. 483–501, Springer, Santa Barbara, CA, USA, 2010.
  20. J. Alderman, C. Janson, C. Cid, and J. Crampton, “Access control in Publicly Verifiable Outsourced Computation,” in Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2015, pp. 657–662, Singapore, April 2015. View at Publisher · View at Google Scholar · View at Scopus
  21. J. Alderman, C. Janson, C. Cid, and J. Crampton, “Hybrid Publicly Verifiable Computation,” in Topics in Cryptology - CT-RSA 2016, vol. 9610 of Lecture Notes in Computer Science, pp. 147–163, Springer International Publishing, Cham, 2016. View at Publisher · View at Google Scholar
  22. A. Beimel, Secure Schemes for Secret Sharing And Key Distribution [Ph.D. Thesis], Technion-Israel Institute of technology, Faculty of computer science, 1996.
  23. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,” in Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06), pp. 89–98, November 2006. View at Publisher · View at Google Scholar · View at Scopus
  24. L. Yu and Z. Cai, “Dynamic scaling of virtual clusters with bandwidth guarantee in cloud datacenters,” in Proceedings of the 35th Annual IEEE International Conference on Computer Communications, IEEE INFOCOM 2016, pp. 1–9, San Francisco, CA, USA, April 2016. View at Publisher · View at Google Scholar · View at Scopus
  25. J. A. Akinyele, C. Garman, I. Miers et al., “Charm: a framework for rapidly prototyping cryptosystems,” Journal of Cryptographic Engineering, vol. 3, no. 2, pp. 111–128, 2013. View at Publisher · View at Google Scholar · View at Scopus
  26. D. Giry, Bluekrypt, https://www.keylength.com/en/.
  27. F. Zhang, Tech. Rep., http://student.seas.gwu.edu/~zfwise/crypto.
  28. A. Miyaji, M. Nakabayashi, and S. Takano, “New explicit conditions of elliptic curve traces for FR-reduction,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 84, pp. 1234–1243, 2001. View at Google Scholar · View at Scopus