id author title date pages extension mime words sentence flesch summary cache txt w6634170t0c Yihua Zhang Secure and Verifiable Outsourcing of Computation and Storage 2015 .txt text/plain 340 11 31 Therefore, it is essential to protect the privacy of sensitive data used in outsourced computation, and verify the integrity of computational results and data storage outsourced to the cloud. However, the top impediment that lies on the way of harnessing all of the benefits of cloud computing is security and privacy considerations that prevent users from placing their data or computations on the cloud. cache/w6634170t0c.txt txt/w6634170t0c.txt