Skip to main content

Verifiable Cloud Computing

  • Living reference work entry
  • First Online:
Encyclopedia of Wireless Networks
  • 67 Accesses

Synonyms

Authenticated query processing; Certified computation; Trusted computing

Definition

Verifiable cloud computing is a way to provide cloud computing services that outsource computing to untrusted third parties while maintaining the integrity of the computation results.

Historical Background

In cloud computing, the data owner outsources the data storage and query services to a cloud service provider in order to scale up the services with a low cost. However, such an outsourcing model brings about serious issues in computation integrity. As the service provider is not the real owner of the data, it might return incomplete or incorrect results, intentionally or unintentionally. Thus, to ensure computation integrity, the client needs to authenticate the soundness (every result originates from the data owner’s database), the completeness (no valid result is missing), and the freshness (the result is up-to-date) of the computation results. To tackle this problem, one early solution is

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Ben-Sasson E, Chiesa A, Genkin D, Tromer E, Virza M (2013) Snarks for c: verifying program executions succinctly and in zero knowledge. In: Canetti R, Garay JA (eds) Advances in cryptology – CRYPTO 2013, pp 90–108

    MATH  Google Scholar 

  • Ben-Sasson E, Chiesa A, Tromer E, Virza M (2014) Succinct non-interactive zero knowledge for a von Neumann architecture. In: Proceedings of the 23rd USENIX conference on security symposium, pp 781–796

    Google Scholar 

  • Braun B, Feldman AJ, Ren Z, Setty S, Blumberg AJ, Walfish M (2013) Verifying computations with state. In: Proceedings of the twenty-fourth ACM symposium on operating systems principles, pp 341–357

    Google Scholar 

  • Canetti R, Paneth O, Papadopoulos D, Triandopoulos N (2014) Verifiable set operations over outsourced databases. In: Public-key cryptography – PKC, pp 113–130

    MATH  Google Scholar 

  • Chen Q, Hu H, Xu J (2013) Authenticating top-k queries in location-based services with confidentiality. Proc VLDB Endowment 7(1):49–60

    Article  Google Scholar 

  • Chen Q, Hu H, Xu J (2015) Authenticated online data integration services. In: Proceedings of the 2015 ACM SIGMOD international conference on management of data, pp 167–181

    Google Scholar 

  • Haeberlen A, Kouznetsov P, Druschel P (2007) Peerreview: practical accountability for distributed systems. ACM SIGOPS Oper Syst Rev 41(6):175–188

    Article  Google Scholar 

  • Hu H, Xu J, Chen Q, Yang Z (2012) Authenticating location-based services without compromising location privacy. In: Proceedings of the 2012 ACM SIGMOD international conference on management of data, pp 301–312

    Google Scholar 

  • Hu H, Chen Q, Xu J (2013) VERDICT: privacy-preserving authentication of range queries in location-based services. In: 2013 IEEE 29th international conference on data engineering, pp 1312–1315

    Google Scholar 

  • Li F, Hadjieleftheriou M, Kollios G, Reyzin L (2006) Dynamic authenticated index structures for outsourced databases. In: Proceedings of the 2006 ACM SIGMOD international conference on management of data, pp 121–132

    Google Scholar 

  • Merkle RC (1989) A certified digital signature. In: Advances in cryptology – CRYPTO, pp 218–238

    Google Scholar 

  • Pang H, Mouratidis K (2008) Authenticating the query results of text search engines. In: Proceedings of the VLDB endowment, pp 126–137

    Google Scholar 

  • Pang H, Tan KL (2004) Authenticating query results in edge computing. In: Proceedings of the 20th international conference on data engineering, pp 560–571

    Google Scholar 

  • Papadopoulos D, Papadopoulos S, Triandopoulos N (2014) Taking authenticated range queries to arbitrary dimensions. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pp 819–830

    Google Scholar 

  • Papamanthou C, Tamassia R, Triandopoulos N (2011) Optimal verification of operations on dynamic sets. In: Advances in cryptology – CRYPTO, pp 91–110

    MATH  Google Scholar 

  • Parno B, Howell J, Gentry C, Raykova M (2013) Pinocchio: nearly practical verifiable computation. In: 2013 IEEE symposium on security and privacy (SP), pp 238–252

    Google Scholar 

  • Peng Y, Fan Z, Choi B, Xu J, Bhowmick SS (2015) Authenticated subgraph similarity searchin outsourced graph databases. IEEE Trans Knowl Data Eng 27(7):1838–1860

    Article  Google Scholar 

  • Xu C, Chen Q, Hu H, Xu J, Hei X (2018a) Authenticating aggregate queries over set-valued data with confidentiality. IEEE Trans Knowl Data Eng 30:630–644

    Article  Google Scholar 

  • Xu C, Xu J, Hu H, Au MH (2018b) When query authentication meets fine-grained access control: a zero-knowledge approach. In: Proceedings of the 2018 ACM SIGMOD international conference on management of data, pp 147–162

    Google Scholar 

  • Yang Y, Papadias D, Papadopoulos S, Kalnis P (2009a) Authenticated join processing in outsourced databases. In: Proceedings of the 2009 ACM SIGMOD international conference on management of data, pp 5–18

    Google Scholar 

  • Yang Y, Papadopoulos S, Papadias D, Kollios G (2009b) Authenticated indexing for outsourced spatial databases. VLDB J 18(3):631–648

    Article  Google Scholar 

  • Yiu ML, Lo E, Yung D (2011) Authentication of moving kNN queries. In: Proceedings of the 27th IEEE international conference on data engineering, pp 565–576

    Google Scholar 

  • Zhang Y, Katz J, Papamanthou C (2015) IntegriDB: verifiable SQL for outsourced databases. In: Proceedings of the 22Nd ACM SIGSAC conference on computer and communications security, pp 1480–1491

    Google Scholar 

  • Zhang Y, Genkin D, Katz J, Papadopoulos D, Papamanthou C (2017a) vSQL: Verifying arbitrary SQL queries over dynamic outsourced databases. In: IEEE symposium on security and privacy, pp 863–880

    Google Scholar 

  • Zhang Y, Katz J, Papamanthou C (2017b) An expressive (zero-knowledge) set accumulator. In: IEEE European symposium on security and privacy (EuroS&P), pp 158–173

    Google Scholar 

  • Zhang Y, Genkin D, Katz J, Papadopoulos D, Papamanthou C (2018) vRAM: faster verifiable ram with program-independent preprocessing. In: IEEE symposium on security and privacy

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Cheng Xu or Jianliang Xu .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Xu, C., Zhang, C., Xu, J. (2019). Verifiable Cloud Computing. In: Shen, X., Lin, X., Zhang, K. (eds) Encyclopedia of Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-32903-1_299-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-32903-1_299-1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-32903-1

  • Online ISBN: 978-3-319-32903-1

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics