Font Size: a A A

Research On Polynomials Outsourcing Computing Protocol

Posted on:2021-01-26Degree:MasterType:Thesis
Country:ChinaCandidate:D W XieFull Text:PDF
GTID:2428330602981447Subject:Basic mathematics
Abstract/Summary:PDF Full Text Request
In recent years,with the updating and iteration of information technology,the amount of data that people have to deal with is also expanding rapidly.The Internet has entered the era of explosive growth of data,and people's demand for computing and storage resources has become increasingly large.Compared with the amount of data to be calculated,the computing power and storage space of local users are limited.In order to solve these problems,a new computing method was proposed.The concept of cloud computing was first proposed by Internet service provider Google in 2007.In short,cloud computing is a kind of computing service centered on users' needs,which provides computing resources to computers and other devices according to needs through the Internet.This concept aims at the increasingly prominent contradiction between the limited resources of local users and the more complex computing tasks that users need to complete,which reflects the rapid development of Internet field towards scale,intensification and specialization,and to a certain extent,realizes people's desire to regard computing as infrastructure.In Internet technology,convenience and security are often relative.With the gradual popularization of cloud computing,many security challenges have emerged.Because of the huge amount of data in the cloud,as well as the heterogeneous and open network space,the data stored in the cloud server is facing threats,such as server security in the cloud,privacy protection of user data,hostile adversary attack,external malicious attack software,etc.Therefore,security outsourcing computing technology has become a hot research area in the cloud computing environment,and it has become an important outsourcing service model.Security outsourcing computing technology allows users with limited resources to purchase cloud service providers' resources,such as computing power and storage resources,according to the payment method,thus greatly reducing the cost of software management and hardware maintenance.In fact,cloud service providers are not completely trusted.In order to save computing and storage resources,they may return wrong computing results or a result without adding computing,or they may sell users' privacy data for their interests.Therefore,it is a.hot topic to study how to protect the privacy of users and quickly and accurately verify the correctness of the results returned by cloud service providers.This topic not only has important theoretical research value,but also has practical significance.Verifiable computing can solve the above problems.Local users with weak computing power cannot independently complete large-scale scientific computing or password computing tasks.They can entrust these tasks to powerful but untrusted cloud service providers.Users perform pre calculation by amortization to obtain the encryption and various keys of their functions,and then send the encryption function to the cloud service provider.After the calculation,the cloud service provider returns the calculation results and the correctness proof.Finally,the user verifies the correctness of the result according to the key in hand.Compared with the local function calculation,the user's workload is greatly reduced.Public verifiable computing is the development of verifiable computing,which enables any third party to verify the correctness of the results returned by the cloud server,which ensures the transferability of the verification results and further guarantees the reliability of the cloud server.In all calculations,the calculation of higher-order polynomial function is of great significance,and it is widely used in the fields of engineering,medicine and scientific calculation.Aiming at this kind of function,this paper studies how to protect users' privacy data better in outsourcing computing scheme.The main contents and achievements of this thesis are as follows:(1)Based on the Euclidean division of polynomials and bilinear mapping,a publicly verifiable outsourcing computing scheme is constructed.The scheme is suitable for higher order polynomial function,and users can verify the correctness of outsourcing calculation results accurately.Based on the assumption of SDH problem,the scheme can be proved to be secure in the random oracle model.In addition,the scheme protects the user's privacy data,and cloud service providers can't get polynomial functions and outsourcing calculation results.Finally,the efficiency of the scheme is verified in performance analysis and simulation.(2)Based on closed efficient pseudorandom functions and other tools,another publicly verifiable high-order polynomial outsourcing calculation scheme is constructed.In the second chapter of the thesis,a pseudo-random function suitable for this scheme is constructed.Based on the DL hypothesis and the co-CDH difficult problem hypothesis,the scheme verifies the security by means of proof of reduction.This solution can also well protect the privacy of users,making polynomial functions and outsourcing calculation results agnostic to cloud servers.In these two schemes,any third party can verify the correctness of the results returned by the ECS,and effectively protect the privacy information of users.In the scheme analysis,the two schemes constructed in this paper are verified by reduction proof under the random oracle model.In addition,the efficiency of outsourcing computing scheme proposed in this paper is tested by programming language,and the experimental results prove the feasibility of the scheme.
Keywords/Search Tags:outsourced computing, privacy protection, public verifiability, blind verifiability, large polynomials
PDF Full Text Request
Related items