90 Int. J. Wireless and Mobile Computing, Vol. 14, No. 1, 2018 Copyright © 2018 Inderscience Enterprises Ltd. Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation Shanshan Kong* College of Computer Science, Beijing University of Technology, Beijing, China and College of Science, North China University of Science and Technology, Hebei, China Email: kongss27@163.com *Corresponding author Yongquan Cai College of Computer Science, Beijing University of Technology, Beijing, China Email: cyq@bjut.edu.cn Fei Xue College of Computer Science, Beijing Wuzi University, Beijing, China Email: xuefei2004@126.com Haiyang Yu and Allah Ditta College of Computer Science, Beijing University of Technology, Beijing, China Email: billyukiwi@163.com Email: hafizad88@yahoo.com Abstract: With the emergence of the cloud computing paradigm in scientific and business applications, computation outsourcing to the cloud has become a popular application in the age of cloud computing. However, this computing paradigm brings in some new security concerns and challenges, such as input/output privacy and result verifiability. In this paper we use similar transformation of matrix to design secure verifiable and practical outsourcing protocol for matrix multiplication calculation. Compared with those existing outsourcing protocols, our protocol has obvious improvement concerning both efficiency and security. In order to check the correctness of the result returned from the cloud, an efficient verification algorithm is employed. Computational complexity analysis shows that our protocol is highly efficient. Keywords: cloud computing; outsourcing computation; secure outsourcing; multiplication calculation; verification. Reference to this paper should be made as follows: Kong, S., Cai, Y., Xu, F., Yu, H. and Ditta, A. (2018) ‘Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation’, Int. J. Wireless and Mobile Computing, Vol. 14, No. 1, pp.90–96. Biographical notes: Shanshan Kong is currently a PhD scholar at the School of College of Computer Science, Beijing University of Technology. She received her BEng degree and Master degree in Applied Mathematics from Hebei United University, China, in 2010 and 2013, respectively. Her research interests are in the area of information security and cloud computing.