Font Size: a A A

Research On Verifiable Outsourcing Scheme For Matrix Multiplication In Cloud Environment

Posted on:2021-04-08Degree:MasterType:Thesis
Country:ChinaCandidate:J Z ZhengFull Text:PDF
GTID:2370330602481447Subject:Basic mathematics
Abstract/Summary:PDF Full Text Request
Cloud computing technology provides a new type of solution for the calculation and storage of user's data,realizing the long-cherished dream of "computing as an infrastructure." As one of the services that cloud computing technology can provide,outsourcing computing technology enables users to outsource complex computing to cloud servers,greatly reducing the storage and computing burden of users with limited resources.Therefore,the technology has great scientific significance and practical value.While outsourcing computing provides efficient and flexible computing services,it also faces many technical challenges and some security issues that need to be resolved.At present,the research on high-efficiency outsourced computing technology with security has become a hot research direction that academia and industry are paying close attention to.First of all,an effective outsourcing computing solution must ensure the accuracy of the calculation results:in a real cloud environment,it is impossible to find a completely trusted cloud server,which may appear to be returned to the drive of its own interests.The user has a wrong calculation result,so it is very important to verify the correctness of the calculation result.Secondly,an effective outsourcing calculation scheme must ensure high efficiency:that is,the calculation cost of the user in the plan should be less than the cost of the user's own function calculation.If the user's calculation cost is equivalent to the cost of the calculation task itself,then the outsourced calculation will lose meaning.Finally,a secure outsourcing computing solution should also ensure the privacy of user's data:when users request to perform outsourcing computing tasks,they will inevitably involve some of their own sensitive data.Because they cannot fully trust the cloud server,therefore,outsourcing computing faces a An important security issue is the user's data security.In addition,in some specific application scenarios,there are also specific requirements for outsourcing computing functions.The main contents of this thesis are as follows:First,this thesis analyzes the research background and research significance of outsourcing computing technology based on cloud environment,as well as the current research status of outsourcing computing technology at home and abroad,and summarizes the advantages and disadvantages of some existing outsourcing computing solutions.Then,it mainly studies the calculation protocol of large-scale matrix product safety outsourcing,puts forward two safe matrix product outsourcing calculation schemes,and analyzes the security and correctness of the two schemes respectivelyThe main research results of this thesis are as follows:(1)Multi-user blindly publicly verifiable outsourcing scheme for matrix multiplication.This scheme efficiently realizes the safe outsourcing of large-scale matrix products while ensuring the privacy of user's data.At the same time,the scheme also realizes blind public verification of the calculation results,ensuring the accuracy of the outsourcing calculation results.In addition,the solution supports multi-user anonymous outsourcing,protecting the user's identity privacy.It is concluded through security proofs and comparative analysis that the scheme can safely and efficiently implement large-scale matrix outsourcing.(2)Undeniable blindly publicly verifiable outsourcing scheme for matrix multiplication.This scheme efficiently realizes the safe outsourcing of large-scale matrix products while ensuring the privacy of user's data.The scheme also realizes blind public verification of the calculation results,ensuring the accuracy of the outsourcing calculation results.In addition,the solution is undeniable,effectively preventing the user or cloud server from maliciously denying the effective interaction process,and maintaining the interests of both the user and the cloud server.Through the correctness proof and functional comparison analysis,it is concluded that the scheme can safely and efficiently achieve the outsourcing of large-scale matrix.The two schemes proposed in this thesis achieve the outsourcing of large-scale matrix products more efficiently,protecting the user's data privacy.In addition,the special nature of the anonymity of scheme 1 and the undeniable of scheme 2 can also be more suitable for practical application scenarios.
Keywords/Search Tags:outsourced computation, matrix multiplication, blind public verification, high efficiency, undeniable
PDF Full Text Request
Related items