You are not logged in.

Enabling efficient and secure outsourcing of large matrix multiplications

Jia, Kun, Li, Hongwei, Liu, Dongxiao and Yu, Shui 2015, Enabling efficient and secure outsourcing of large matrix multiplications, in GLOBECOM 2015: Proceedings of the IEEE Global Communications Conference, IEEE, Piscataway, N.J., pp. 1-6, doi: 10.1109/GLOCOM.2015.7417184.

Attached Files
Name Description MIMEType Size Downloads

Title Enabling efficient and secure outsourcing of large matrix multiplications
Author(s) Jia, Kun
Li, Hongwei
Liu, Dongxiao
Yu, ShuiORCID iD for Yu, Shui orcid.org/0000-0003-4485-6743
Conference name IEEE Global Communications. Conference (2015: San Diego, California)
Conference location San Diego, California
Conference dates 06-09 Dec. 2015
Title of proceedings GLOBECOM 2015: Proceedings of the IEEE Global Communications Conference
Publication date 2015
Start page 1
End page 6
Total pages 6
Publisher IEEE
Place of publication Piscataway, N.J.
Summary With the growing popularity of cloud computing, outsourced computing has attracted much research effort recently. A computationally weak client is capable of delegating its heavy computing tasks, such as large matrix multiplications, to the cloud server. Critical requirements for such tasks include the need to guarantee the unforgeability of computing results and the preservation of the privacy of clients. On one hand, the result computed by the cloud server needs to be verified since the cloud server cannot be fully honest. On the other hand, as the data involved in computing may contain some sensitive information of the client, the data should not be identified by the cloud server. In this paper, we address these above issues by developing an Efficient and Secure Outsourcing scheme for Large Matrix Multiplication, named ESO- LMM. Security analysis demonstrates that ESO-LMM achieves the security requirements in terms of unforgeability of proof and privacy protection of outsourced data. Furthermore, performance evaluation indicates that ESO-LMM is much more efficient compared with the existing works in terms of computation, communication and storage overhead.
ISBN 9781479959525
Language eng
DOI 10.1109/GLOCOM.2015.7417184
Field of Research 080303 Computer System Security
080501 Distributed and Grid Systems
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
ERA Research output type E Conference publication
Copyright notice ©2015, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30083649

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 3 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 110 Abstract Views, 0 File Downloads  -  Detailed Statistics
Created: Tue, 24 May 2016, 17:40:10 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.