Font Size: a A A

Research On Verifiable Matrix Secure Outsourcing Computing In Cloud Computing Environment

Posted on:2018-06-12Degree:MasterType:Thesis
Country:ChinaCandidate:X LiuFull Text:PDF
GTID:2348330563952550Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the continuous development of modern science and technology,microcomputers with weak performance already couldn't meet the needs of engineering computing,scientific research and even daily production and living.However,the large computer with powerful computing ability is very expensive.The emergence of cloud computing has brought the gospel to these problems.Cloud computing connects the idle computing nodes deployed in different geographical space through high-speed network and then becomes a service platform with powerful computing resources.Users can delegate large computing tasks to powerful cloud servers through personal terminal.The cloud server performs the related computing tasks according to the user's requirements,and then returns the result to the user.The cloud service provider charges a fee according to the number of times or the amount of resources usage.The emergence of cloud computing has brought great convenience to users,but there is also a huge safety hazard.At present,the main problems of cloud security outsourcing are focused on the following two aspects:(1)Users data privacy can't be guaranteed.Some computing tasks often contain important private data.If these private data are uploaded directly to the cloud server in the outsourcing computation,and then exploited by malicious attacker,it will bring a huge security risk to users.However,the usage of general encryption scheme prevents the cloud server from operating users' underlying data.(2)The reliability of cloud server computation results can't be verified efficiently.It is undoubtedly difficult for weak-performance clients to find an effective way to filter out the illegal return results.Therefore,the urgent problem to be solved for secure outsourcing computing scheme is to build an available encryption method for cloud.In premise of guaranteeing the security of users' privacy,it can perform a variety of operations as per the users' intention correctly and find the illegal return results in time,thus to achieve data security and results verifiability.As to the grim reality faced by current outsourcing computation and the current research situation in the field of secure outsourcing computing,this paper deeply analyzes the existing problems in the current secure outsourcing protocols and takes the matrix secure outsourcing computing as the main point to mainly study the following aspects:(1)Matrix multiplication secure outsourcing computing protocol.In view of the problems of low security,inefficiency and poor verifiability existed in current research schemes,we optimize the current matrix multiplication secure outsourcing protocol in use of data redundancy and Shannon's confusion theory based on the related properties of matrix multiplication,and then propose a new data validation idea to improve the data security and verifiability.It can be showed from data simulation experiments that this protocol has high execution efficiency to meet the expected design requirements.(2)Matrix determinant secure outsourcing computing protocol.As the current determinant outsourcing computing protocols can't resist the attack of common factor algorithm and also its data security is weak and return results verification efficiency is low,we propose a new data encryption algorithm with higher secure performance based on the ideas of determinant identical transformation and matrix LU decomposition,which improves the results verifiability while ensuring the computing efficiency.In this scheme,the probability for an illegal result returned from a malicious attacker to pass the client validation is 0.(3)Linear equations secure outsourcing computing scheme.To construct a new equation with similar solutions as the original one by introducing the above data encryption scheme of the fourth chapter into linear equations outsourcing computing and combining with the idea of matrix block.By operating outsourcing computing of the new linear equations,the security of the coefficients of the original equation and the state information of the whole system is ensured.It can be showed from the theoretical analysis and python simulation experiments that this scheme satisfies the needs of correctness,security,high efficiency and verifiability.
Keywords/Search Tags:Cloud computing, Secure outsourcing computing, Matrix computing, Data encryption
PDF Full Text Request
Related items