Authors: Shu Guo; Haixia Xu
Addresses: Institute of Information Engineering, Chinese Academy of Science, Beijing, China ' Institute of Information Engineering, Chinese Academy of Science, Beijing, China
Abstract: Cloud computing is becoming widely used both in academia and industry and one of the most important applications is delegating computation. A computationally weak client delegates tasks to one or more workers in cloud, and this is called delegation computation. Delegation computation has high security requirements, and it needs to ensure that the information of the client would not be leaked and the computation will be computed correctly. What's more, the clients can verify the result after computation. This paper presents a delegation protocol and it allows the client to delegate a large polynomial to more than one worker while keeping privacy and correctness. In this paper, the workers make computations directly on the shares from the client, and keep the threshold unchanged. This protocol has these advantages: the protocol keeps privacy of the original input; the workers have no interaction with each other during the execution; the protocol keeps the threshold unchanged.
Keywords: secret sharing; cloud computing; delegation computation; unchanged threshold; secure delegation; large polynomial computation; multi-party cloud; privacy protection; cloud security.
International Journal of Grid and Utility Computing, 2015 Vol.6 No.1, pp.1 - 7
Received: 16 Dec 2012
Accepted: 20 Apr 2013
Published online: 18 Dec 2014 *