Abstract

Outsourcing computing is an application of cloud computing. It is an important method to solve the problem of client resource limitation. However, outsourcing computing brings security and efficiency challenges. Matrix multiplication computation (MMC) outsourcing has attracted many researchers to carry out research and has achieved many admirable results. Unfortunately, there is still a problem with zero elements of information protection for MMC outsourcing. In this paper, we are motivated to design a protocol, which can protect the private information of the zero elements, for outsourcing MMC to the cloud server. Our proposed protocol not only solves the problem of protecting zero elements information but also has no large client-overhead. The main idea is to add a special matrix to the original matrix for hiding zero elements before transforming the computation task. Then, the cloud server computes the received encryption task and returns the result to the client. Finally, the client decrypts and verifies the result. The experiment verifies the efficiency and practicability of our protocol. The comparison with previous schemes shows that the protocol improves security without much client overhead.

Highlights

  • The rapid development of big data makes the processing pressure of terminal equipment more and more

  • The cloud server performs matrix multiplication computation on the received matrices, and returns result to the client

  • Receiving the results returned by the cloud server, the client decrypts the consequence according to the local secret keys to obtain the solution of the original matrix multiplication computation problem

Read more

Summary

INTRODUCTION

The rapid development of big data makes the processing pressure of terminal equipment more and more. The cloud server performs matrix multiplication computation on the received matrices, and returns result to the client. ResultDec. Receiving the results returned by the cloud server, the client decrypts the consequence according to the local secret keys to obtain the solution of the original matrix multiplication computation problem. The malicious cloud model: The cloud server may not perform computations according to the protocol It will forge a random result back to the client and attempt to pass the client-side verification for saving its resources. A. PROPOSED SECURE OUTSOURCING OF MMC The client wants to outsource the matrix multiplication computation task Φ(XY ) to the cloud server and does not reveal its privacy, so the client can implement our protocol to complete the outsourcing computation.

1: The client generates spare matrices
SECURITY
VERIFIABILITY
THEORETICAL ANALYSIS
EXPERIMENTAL EXAMINATION
COMPARISON WITH PREVIOUS WORK
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.