Publicly verifiable 1-norm and 2-norm operations over outsourced data stream under single-key setting

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the advent of the big data era, the amount of data computation is getting larger and larger, and the computational load of clients is also increasing day by day. The advent of clouds allows clients to outsource their data to the cloud for computing services. Outsourced computation has greatly reduced the computational burden of clients, but also brings the issue of trust. Because the cloud is not trustworthy, clients need to verify the correctness of the remote computation results. In this paper, we mainly study the common norm operations, and propose two publicly verifiable schemes for 1-norm and 2-norm operations respectively, any client can publicly verify these two common norm operations under single-key setting by using our schemes.

Cite

CITATION STYLE

APA

Liu, Y., Wang, X. A., Sangaiah, A. K., & Shao, H. (2018). Publicly verifiable 1-norm and 2-norm operations over outsourced data stream under single-key setting. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 17, pp. 462–469). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-319-75928-9_41

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free