Efficient Secure Outsourcing Computation of Matrix Multiplication in Cloud Computing

With development of outsourcing computation, it is possible for clients with limited computing resources to outsource heavy computational tasks to the cloud server and thus relieve huge burden of the client. As continuous attention of delegation in recent years, requirements of security and efficiency are badly concerned undoubtedly, especially for matrix multiplication. Considering wide applications of matrix multiplication, e.g. graph processing and large date processing, in this paper, we present an identity-based publicly verifiable delegation scheme in amortized model which meets the need of security and efficiency both. Moreover, by using an secure encryption algorithm and a verification certification, the security analysis of the proposed scheme demonstrates the privacy of matrixes involved and the correctness. To demonstrate efficient properties, we compared our scheme with some existing works in terms of functionality as well as computation, storage and communication overhead.

[1]  Yael Tauman Kalai,et al.  Improved Delegation of Computation using Fully Homomorphic Encryption , 2010, IACR Cryptol. ePrint Arch..

[2]  Mianxiong Dong,et al.  ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.

[3]  Michael Backes,et al.  Verifiable delegation of computation on outsourced data , 2013, CCS.

[4]  Mianxiong Dong,et al.  Service Pricing Decision in Cyber-Physical Systems: Insights from Game Theory , 2016, IEEE Transactions on Services Computing.

[5]  Yi Yang,et al.  Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data , 2016, IEEE Transactions on Dependable and Secure Computing.

[6]  Xiao Liu,et al.  A Trust-Based Adaptive Probability Marking and Storage Traceback Scheme for WSNs , 2016, Sensors.

[7]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[8]  George Danezis,et al.  Proceedings of the 2012 ACM conference on Computer and communications security , 2012, CCS 2012.

[9]  Alptekin Küpçü,et al.  Incentivizing outsourced computation , 2008, NetEcon '08.

[10]  Minyi Guo,et al.  LSCD: A Low-Storage Clone Detection Protocol for Cyber-Physical Systems , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[11]  Hongwei Li,et al.  Enabling Efficient and Secure Outsourcing of Large Matrix Multiplications , 2014, GLOBECOM 2014.

[12]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[13]  Craig Gentry,et al.  Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.

[14]  Xiao Liu,et al.  A comprehensive analysis for fair probability marking based traceback approach in WSNs , 2016, Secur. Commun. Networks.

[15]  Xiaodong Lin,et al.  Achieving authorized and ranked multi-keyword search over encrypted cloud data , 2015, 2015 IEEE International Conference on Communications (ICC).

[16]  Yuan-Shun Dai,et al.  Enabling efficient publicly verifiable outsourcing computation for matrix multiplication , 2015, 2015 International Telecommunication Networks and Applications Conference (ITNAC).

[17]  Hongwei Li,et al.  Engineering searchable encryption of mobile cloud networks: when QoE meets QoP , 2015, IEEE Wireless Communications.