Cloud Outsourcing Computing Security Protocol of Matrix Multiplication Computation Based on Similarity Transformation

Shanshan Kong,Yongquan Cai,Fei Xue,Haiyang Yu,Allah Ditta
DOI: https://doi.org/10.1504/ijwmc.2018.10011084
2018-01-01
International Journal of Wireless and Mobile Computing
Abstract:With the emergence of the cloud computing paradigm in scientific and business applications, computation outsourcing to the cloud has become a popular application in the age of cloud computing. However, this computing paradigm brings in some new security concerns and challenges, such as input/output privacy and result verifiability. In this paper we use similar transformation of matrix to design secure verifiable and practical outsourcing protocol for matrix multiplication calculation. Compared with those existing outsourcing protocols, our protocol has obvious improvement concerning both efficiency and security. In order to check the correctness of the result returned from the cloud, an efficient verification algorithm is employed. Computational complexity analysis shows that our protocol is highly efficient.
What problem does this paper attempt to address?