Font Size: a A A

Research On Outsourcing Computing Based On Cloud-based Privacy Protection

Posted on:2020-05-14Degree:MasterType:Thesis
Country:ChinaCandidate:J X YangFull Text:PDF
GTID:2438330602951628Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the development of cloud computing,cloud computing technology has become an important tool in the Internet era and gradually penetrated into people's daily life in a special way.Due to the powerful computing power and storage capacity of cloud,data outsourcing has become an inevitable trend in the environment provided by cloud computing.Users with limited resources can outsource complex computing to the cloud,thus reducing the complexity and amount of local computing and improving the effectiveness of algorithms or protocols.However,since the cloud is not completely trusted,once sensitive data is delivered to the untrusted cloud,control of the data will be transferred from the user to the cloud service provider,and then security and privacy will become the key issues to be solved.The use of cryptography to encrypt or disguise sensitive information is an important basis for the implementation of secure outsourcing computing and provides a strong support for the implementation of privacy outsourcing computing protocol.In recent years,cloud computing technology has been closely watched by relevant scholars and has become a vital means in the era of big data.By using the special model of cloud technology,people's lives become more convenient and smarter.Cloud servers have very powerful computing power and rich storage space.Therefore,in the cloud environment,outsourcing computing technology has become an inevitable trend and trend.Because the user's local computing resources are limited,users can outsource complex calculations to the cloud,such as bilinear pair operations,large matrix operations,and so on.This technique can reduce the complexity of local computing and thus improve the effectiveness of the algorithm or protocol.However,the cloud may be honest and curious.When the user's data is outsourced to the cloud server for processing,the control of the data is transferred from the user to the cloud service provider.At this time,the security of the user data becomes an urgent problem to be solved.key problem.Cryptography provides a strong guarantee for the security and privacy of user data.It is an important foundation for the development of outsourced computing technology.The paper mainly studies the bilinear pairing outsourcing computation and matrix inversion outsourcing computation.The following are the main research results:This paper mainly studies the bilinear outsourcing computation and matrix inversion outsourcing computation.The following are the main research results:1.The outsourcing computing scheme of bilinear pairings is studied.Combined with the existing bilinear pairings outsourcing algorithm,two new bilinear pairings outsourcing algorithms based on a single untrusted server model are proposed.One can outsource two asymmetric bilinear pairings at the same time,where the verifiability is about 1/4,and the other can outsource two symmetric bilinear pairings at the same time,whose verifiability is about 2/7.Both of them have higher verifiability than the most effective outsourcing algorithm at present when it outsources two bilinear pairs at the same time.Finally,the security of the two algorithms is analyzed and compared with the existing ones.2.The security outsourcing scheme for matrix inversion is studied.An outsourcing scheme to guarantee the security of matrix inverse computing(SMIC)is proposed to solve the large-scale MIC task.Compared with the existing technology,it provides stronger privacy protection.Theoretical analysis shows that SMIC not only guarantees the privacy of the MIC task input matrix,but also guarantees the MIC solution.We also conducted a large number of experiments to evaluate our scheme.The results show that SEMIC brings significant cost savings for customers to solve large-scale MIC tasks.In addition,the performance comparison of SMIC and its related schemes shows that SMIC has higher efficiency.
Keywords/Search Tags:Bilinear pairing, Matrix inverse, Outsourcing computation, Privacy protection, Verifiable computation
PDF Full Text Request
Related items