You can view the full text of this article for free using the link below.

Title: Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation

Authors: Shanshan Kong; Yongquan Cai; Fei Xue; Haiyang Yu; Allah Ditta

Addresses: College of Computer Science, Beijing University of Technology, Beijing, China; College of Science, North China University of Science and Technology, Hebei, China ' College of Computer Science, Beijing University of Technology, Beijing, China ' College of Computer Science, Beijing Wuzi University, Beijing, China ' College of Computer Science, Beijing University of Technology, Beijing, China ' College of Computer Science, Beijing University of Technology, Beijing, China

Abstract: With the emergence of the cloud computing paradigm in scientific and business applications, computation outsourcing to the cloud has become a popular application in the age of cloud computing. However, this computing paradigm brings in some new security concerns and challenges, such as input/output privacy and result verifiability. In this paper we use similar transformation of matrix to design secure verifiable and practical outsourcing protocol for matrix multiplication calculation. Compared with those existing outsourcing protocols, our protocol has obvious improvement concerning both efficiency and security. In order to check the correctness of the result returned from the cloud, an efficient verification algorithm is employed. Computational complexity analysis shows that our protocol is highly efficient.

Keywords: cloud computing; outsourcing computation; secure outsourcing; multiplication calculation; verification.

DOI: 10.1504/IJWMC.2018.089984

International Journal of Wireless and Mobile Computing, 2018 Vol.14 No.1, pp.90 - 96

Available online: 13 Feb 2018 *

Full-text access for editors Access for subscribers Free access Comment on this article