2017
DOI: 10.1109/access.2017.2666839
|View full text |Cite
|
Sign up to set email alerts
|

Context-Aware Verifiable Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
1
1

Relationship

3
5

Authors

Journals

citations
Cited by 25 publications
(16 citation statements)
references
References 35 publications
0
16
0
Order By: Relevance
“…Fourthly, the literature still lacks an effective solution to verify the correctness of data computation when utilizing edge nodes to do data analytics. The correctness of calculation remains high importance in outsourced data analytics [102], [103]. In edge computing, neither cloud servers nor edge nodes can be fully trusted, which makes it hard to ensure the correctness of data computation, processing and analytics.…”
Section: A Open Issuesmentioning
confidence: 99%
“…Fourthly, the literature still lacks an effective solution to verify the correctness of data computation when utilizing edge nodes to do data analytics. The correctness of calculation remains high importance in outsourced data analytics [102], [103]. In edge computing, neither cloud servers nor edge nodes can be fully trusted, which makes it hard to ensure the correctness of data computation, processing and analytics.…”
Section: A Open Issuesmentioning
confidence: 99%
“…Since its first appearance in 1991 [20], considerable attention has been devoted into verifiable computation with more and more companies and individuals to migrate their services to cloud while the service provider can be an untrusted or even malicious party who will return plausible results without performing its actual work [21], [22].…”
Section: Related Workmentioning
confidence: 99%
“…If the source and immediate nodes producing or transferring the data are trustworthy, the data quality and trustworthiness can be ensured [44]. In addition, data provenance can be used to detect errors in data generation and processing and find out the nodes and the actions that produced the errors, which can be used in verifiable computation [57,61,62]. On the other hand, detailed provenance information allows data recovery when data is unusable to maintain system availability and ensure smooth data communications [19].…”
Section: Usages Of Data Provenancementioning
confidence: 99%