Main Article Content

Abstract

In this project verifiable outsourcing computation into the area of high-dimensional feature extraction and propose a secure verifiable outsourcing scheme of feature extraction based on co-occurrence matrix with single untrusted server. The original images are secret for the server by using a projection of one to many with trapdoor, and we propose a symmetric probabilistic encryption as its concrete construction. The analyzer can obtain true results of feature extraction and detect any failure with a probability of 1 if the server misbehaves. Finally, provide the simulations on extracting CCJRM features. The proposed outsourcing scheme could greatly decrease the computational cost of the analyzer without exposure of the original images and their extraction results.

Article Details

How to Cite
N. Zahira Jahan, & S. Piravin. (2018). Multiple Integrity Verification and Auditing Protocol Model for Cloud Computing . International Journal of Intellectual Advancements and Research in Engineering Computations, 6(2), 1397–1399. Retrieved from https://ijiarec.com/ijiarec/article/view/666