Skip to main content
Top

2019 | OriginalPaper | Chapter

More Secure Outsource Protocol for Matrix Multiplication in Cloud Computing

Authors : Xu An Wang, Shuaishuai Zhu, Arun Kumar Sangaiah, Shuai Xue, Yunfei Cao

Published in: Advances on P2P, Parallel, Grid, Cloud and Internet Computing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Matrix multiplication is a very basic computation task in many scientific algorithms. Recently Lei et al. proposed an interesting outsource protocol for matrix multiplication in cloud computing. Their proposal is very efficient, however we find that the proposal is not so secure from the view of cryptography. Concretely, the cloud can easily distinguish which matrix has been outsourced from two candidate matrixes. That is, their proposal does not satisfy the indistinguishable property under chosen plaintext attack. Finally we give an improved outsource protocol for matrix multiplication in cloud computing.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Chen, X., Susilo, W., Li, J., Wong, D.S., Ma, J., Tang, S., Tang, Q.: Efficient algorithms for secure outsourcing of bilinear pairings. Theory Comput. Sci. 562, 112–121 (2015)MathSciNetCrossRef Chen, X., Susilo, W., Li, J., Wong, D.S., Ma, J., Tang, S., Tang, Q.: Efficient algorithms for secure outsourcing of bilinear pairings. Theory Comput. Sci. 562, 112–121 (2015)MathSciNetCrossRef
2.
go back to reference Atallah, M., Frikken, K.: Securely outsourcing linear algebra computations. In: Proceedings of 5th ACM Symposium on Information, Computer and Communications Security, 2010, pp. 48–59 (2010) Atallah, M., Frikken, K.: Securely outsourcing linear algebra computations. In: Proceedings of 5th ACM Symposium on Information, Computer and Communications Security, 2010, pp. 48–59 (2010)
3.
go back to reference Atallah, M., Pantazopoulos, K., Rice, J., Spafford, E.: Secure outsourcing of scientific computations. Adv. Comput. 54, 215–272 (2002)CrossRef Atallah, M., Pantazopoulos, K., Rice, J., Spafford, E.: Secure outsourcing of scientific computations. Adv. Comput. 54, 215–272 (2002)CrossRef
4.
go back to reference Wang, C., Ren, K., Wang, J.: Secure and practical outsourcing of linear programming in cloud computing. In: Proceedings of IEEE Conference on Computer Communications, pp. 820–828 (2011) Wang, C., Ren, K., Wang, J.: Secure and practical outsourcing of linear programming in cloud computing. In: Proceedings of IEEE Conference on Computer Communications, pp. 820–828 (2011)
5.
go back to reference Wang, C., Ren, K., Wang, J., Wang, Q.: Harnessing the cloud for securely outsourcing large-scale systems of linear equations. IEEE Trans. Parallel Distrib. Syst. 24(6), 1172–1181 (2012). JunCrossRef Wang, C., Ren, K., Wang, J., Wang, Q.: Harnessing the cloud for securely outsourcing large-scale systems of linear equations. IEEE Trans. Parallel Distrib. Syst. 24(6), 1172–1181 (2012). JunCrossRef
6.
go back to reference Lei, X., Liao, X., Huang, T., Heriniaina, F.: Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud. Inf. Sci. 280, 205–217 (2014)CrossRef Lei, X., Liao, X., Huang, T., Heriniaina, F.: Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud. Inf. Sci. 280, 205–217 (2014)CrossRef
7.
go back to reference Lei, X., Liao, X., Huang, T., Li, H., Hu, C.: Outsourcing large matrix inversion computation to a public cloud. IEEE Trans. Cloud Comput. 1(1), 78–87 (2013) Lei, X., Liao, X., Huang, T., Li, H., Hu, C.: Outsourcing large matrix inversion computation to a public cloud. IEEE Trans. Cloud Comput. 1(1), 78–87 (2013)
8.
go back to reference Lei, X., Liao, X., Huang, T., Li, H., Hu, C.: Cloud computing service: the case of large matrix determinant computation. IEEE Trans. Serv. Comput. 8(5), 688–700 (2015) Lei, X., Liao, X., Huang, T., Li, H., Hu, C.: Cloud computing service: the case of large matrix determinant computation. IEEE Trans. Serv. Comput. 8(5), 688–700 (2015)
9.
go back to reference Chen, F., Xiang, T., Yang, Y.: Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud. J. Parallel Distrib. Comput. 74(3), 2141–2151 (2014)CrossRef Chen, F., Xiang, T., Yang, Y.: Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud. J. Parallel Distrib. Comput. 74(3), 2141–2151 (2014)CrossRef
10.
go back to reference Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Proceedings of the 2nd International Conference Theory Cryptography, 2005, pp. 264–282 (2005) Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Proceedings of the 2nd International Conference Theory Cryptography, 2005, pp. 264–282 (2005)
Metadata
Title
More Secure Outsource Protocol for Matrix Multiplication in Cloud Computing
Authors
Xu An Wang
Shuaishuai Zhu
Arun Kumar Sangaiah
Shuai Xue
Yunfei Cao
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-02607-3_26