90 Int. J. Wireless and Mobile Computing, Vol. 14, No. 1, 2018
Copyright © 2018 Inderscience Enterprises Ltd.
Cloud outsourcing computing security protocol
of matrix multiplication computation based on
similarity transformation
Shanshan Kong*
College of Computer Science,
Beijing University of Technology,
Beijing, China
and
College of Science,
North China University of Science and Technology,
Hebei, China
Email: kongss27@163.com
*Corresponding author
Yongquan Cai
College of Computer Science,
Beijing University of Technology,
Beijing, China
Email: cyq@bjut.edu.cn
Fei Xue
College of Computer Science,
Beijing Wuzi University,
Beijing, China
Email: xuefei2004@126.com
Haiyang Yu and Allah Ditta
College of Computer Science,
Beijing University of Technology,
Beijing, China
Email: billyukiwi@163.com
Email: hafizad88@yahoo.com
Abstract: With the emergence of the cloud computing paradigm in scientific and business
applications, computation outsourcing to the cloud has become a popular application in the age of
cloud computing. However, this computing paradigm brings in some new security concerns and
challenges, such as input/output privacy and result verifiability. In this paper we use similar
transformation of matrix to design secure verifiable and practical outsourcing protocol for matrix
multiplication calculation. Compared with those existing outsourcing protocols, our protocol
has obvious improvement concerning both efficiency and security. In order to check the
correctness of the result returned from the cloud, an efficient verification algorithm is employed.
Computational complexity analysis shows that our protocol is highly efficient.
Keywords: cloud computing; outsourcing computation; secure outsourcing; multiplication
calculation; verification.
Reference to this paper should be made as follows: Kong, S., Cai, Y., Xu, F., Yu, H. and Ditta,
A. (2018) ‘Cloud outsourcing computing security protocol of matrix multiplication computation
based on similarity transformation’, Int. J. Wireless and Mobile Computing, Vol. 14, No. 1,
pp.90–96.
Biographical notes: Shanshan Kong is currently a PhD scholar at the School of College of
Computer Science, Beijing University of Technology. She received her BEng degree and Master
degree in Applied Mathematics from Hebei United University, China, in 2010 and 2013,
respectively. Her research interests are in the area of information security and cloud computing.