Skip to Content
Big Data
book

Big Data

by Fei Hu
April 2016
Beginner to intermediate
463 pages
18h 53m
English
Auerbach Publications
Content preview from Big Data
266
Big Data: Storage, Sharing, and Security
10.5.2 Verifiable computation
10.5.2.1 Introduction
Imagine that, as in the previous section, we own a computationally weak computer and wish to
outsource some work to a server that we do not trust. Unlike the FHE scenario though, suppose
we now do not care about the confidentiality of the data (perhaps these data are not sensitive),
but we do care that the work is done correctly.
There are a number of ways that one might approach this without using cryptographic tools.
The most straightforward approach is replication—outsourcing the computation to several
different servers and then taking the most common
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Big Data

Big Data

Bernard Marr
Big Data

Big Data

Kuan-Ching Li, Hai Jiang, Laurence T. Yang, Alfredo Cuzzocrea
Big Data

Big Data

Eglantine Schmitt
Big Data

Big Data

James Warren, Nathan Marz

Publisher Resources

ISBN: 9781498734875