메뉴 건너뛰기




Volumn 280, Issue , 2014, Pages 205-217

Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud

Author keywords

Cloud computing; Matrix multiplication; Monte Carlo verification; Secure outsourcing

Indexed keywords

CLOUD COMPUTING; MATRIX ALGEBRA; MONTE CARLO METHODS;

EID: 84902436467     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2014.05.014     Document Type: Article
Times cited : (101)

References (38)
  • 4
    • 84861191978 scopus 로고    scopus 로고
    • Sliding mode filter design for nonlinear polynomial systems with unmeasured states
    • Michael Basin, and Pablo Rodriguez-Ramirez Sliding mode filter design for nonlinear polynomial systems with unmeasured states Inform. Sci. 204 2012 82 91
    • (2012) Inform. Sci. , vol.204 , pp. 82-91
    • Basin, M.1    Rodriguez-Ramirez, P.2
  • 7
    • 84891322736 scopus 로고    scopus 로고
    • Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
    • Fei Chen, Tao Xiang, and Yuanyuan Yang Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud J. Parallel Distrib. Comput. 74 3 2014 2141 2151
    • (2014) J. Parallel Distrib. Comput. , vol.74 , Issue.3 , pp. 2141-2151
    • Chen, F.1    Xiang, T.2    Yang, Y.3
  • 8
    • 77957002840 scopus 로고    scopus 로고
    • Improved delegation of computation using fully homomorphic encryption
    • K.M. Chung, Y. Kalai, S. Vadhan, Improved delegation of computation using fully homomorphic encryption, Advances in Cryptology-CRYPTO 2010, 2010, pp. 483-501.
    • (2010) Advances in Cryptology-CRYPTO 2010 , pp. 483-501
    • Chung, K.M.1    Kalai, Y.2    Vadhan, S.3
  • 9
    • 0000886528 scopus 로고
    • Algorithm 235: Random permutation
    • Richard Durstenfeld Algorithm 235: random permutation Commun. ACM 7 7 1964 420 421
    • (1964) Commun. ACM , vol.7 , Issue.7 , pp. 420-421
    • Durstenfeld, R.1
  • 10
    • 0017677282 scopus 로고
    • Probabilistic machines can use less running time
    • Rusins Freivalds Probabilistic machines can use less running time Inform. Process. 77 1977 839 842
    • (1977) Inform. Process. , vol.77 , pp. 839-842
    • Freivalds, R.1
  • 11
    • 77957005936 scopus 로고    scopus 로고
    • Non-interactive verifiable computing: Outsourcing computation to untrusted workers
    • R. Gennaro, C. Gentry, B. Parno, Non-interactive verifiable computing: outsourcing computation to untrusted workers, Advances in Cryptology-CRYPTO 2010, 2010, pp. 465-482.
    • (2010) Advances in Cryptology-CRYPTO 2010 , pp. 465-482
    • Gennaro, R.1    Gentry, C.2    Parno, B.3
  • 15
    • 24144493423 scopus 로고    scopus 로고
    • How to securely outsource cryptographic computations
    • S. Hohenberger, and A. Lysyanskaya How to securely outsource cryptographic computations Theory Cryptogr. 3378 2005 264 282
    • (2005) Theory Cryptogr. , vol.3378 , pp. 264-282
    • Hohenberger, S.1    Lysyanskaya, A.2
  • 16
    • 84865591373 scopus 로고    scopus 로고
    • Sliding mode control for stochastic systems subject to packet losses
    • Tinggang Jia, Yugang Niu, and Yuanyuan Zou Sliding mode control for stochastic systems subject to packet losses Inform. Sci. 217 2012 117 126
    • (2012) Inform. Sci. , vol.217 , pp. 117-126
    • Jia, T.1    Niu, Y.2    Zou, Y.3
  • 17
    • 0027617773 scopus 로고
    • Fast server-aided secret computation protocols for modular exponentiation
    • S. Kawamura, and A. Shimbo Fast server-aided secret computation protocols for modular exponentiation IEEE J. Select. Areas Commun. 11 5 1993 778 784
    • (1993) IEEE J. Select. Areas Commun. , vol.11 , Issue.5 , pp. 778-784
    • Kawamura, S.1    Shimbo, A.2
  • 19
    • 84919819478 scopus 로고    scopus 로고
    • Outsourcing large matrix inversion computation to a public cloud
    • Xinyu Lei, Xiaofeng Liao, Tingwen Huang, Huaqing Li, and Chunqiang Hu Outsourcing large matrix inversion computation to a public cloud IEEE Trans. Cloud Comput. 1 1 2013 78 87
    • (2013) IEEE Trans. Cloud Comput. , vol.1 , Issue.1 , pp. 78-87
    • Lei, X.1    Liao, X.2    Huang, T.3    Li, H.4    Hu, C.5
  • 20
    • 78049357399 scopus 로고    scopus 로고
    • Secure multiparty computation for privacy-preserving data mining
    • Yehuda Lindell, and Benny Pinkas Secure multiparty computation for privacy-preserving data mining J. Privacy Confident. 1 1 2009 59 98
    • (2009) J. Privacy Confident. , vol.1 , Issue.1 , pp. 59-98
    • Lindell, Y.1    Pinkas, B.2
  • 21
    • 84862777930 scopus 로고    scopus 로고
    • Swarm scheduling approaches for work-flow applications with security constraints in distributed data-intensive computing environments
    • Hongbo Liu, Ajith Abraham, Václav Snášel, and Seán McLoone Swarm scheduling approaches for work-flow applications with security constraints in distributed data-intensive computing environments Inform. Sci. 192 2012 228 243
    • (2012) Inform. Sci. , vol.192 , pp. 228-243
    • Liu, H.1    Abraham, A.2    Snášel, V.3    McLoone, S.4
  • 22
    • 84889079354 scopus 로고    scopus 로고
    • Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
    • Qin Liu, Guojun Wang, and Jie Wu Time-based proxy re-encryption scheme for secure data sharing in a cloud environment Inform. Sci. 258 2014 355 370
    • (2014) Inform. Sci. , vol.258 , pp. 355-370
    • Liu, Q.1    Wang, G.2    Wu, J.3
  • 23
    • 84889103004 scopus 로고    scopus 로고
    • Architecture and protocol for intercloud communication
    • Jaime Lloret, Miguel Garcia, Jesus Tomas, and Joel JPC Rodrigues Architecture and protocol for intercloud communication Inform. Sci. 258 2014 434 451
    • (2014) Inform. Sci. , vol.258 , pp. 434-451
    • Lloret, J.1    Garcia, M.2    Tomas, J.3    Rodrigues, J.J.4
  • 24
    • 84889017265 scopus 로고    scopus 로고
    • Editorial: Cloud computing service and architecture models
    • Gregorio Martinez, Sherali Zeadally, and Han-Chieh Chao Editorial: cloud computing service and architecture models Inform. Sci.: An Int. J. 258 2014 353 354
    • (2014) Inform. Sci.: An Int. J. , vol.258 , pp. 353-354
    • Martinez, G.1    Zeadally, S.2    Chao, H.-C.3
  • 25
    • 85031767993 scopus 로고
    • Speeding up secret computations with insecure auxiliary devices
    • Springer
    • T. Matsumoto, K. Kato, and H. Imai Speeding up secret computations with insecure auxiliary devices Advances in Cryptology-CRYPTO 88 1990 Springer 497 506
    • (1990) Advances in Cryptology-CRYPTO 88 , pp. 497-506
    • Matsumoto, T.1    Kato, K.2    Imai, H.3
  • 27
    • 84855889124 scopus 로고    scopus 로고
    • Improving linear discriminant analysis with artificial immune system-based evolutionary algorithms
    • Mehdi Mohammadi, Bijan Raahemi, Ahmad Akbari, Babak Nassersharif, and Hossein Moeinzadeh Improving linear discriminant analysis with artificial immune system-based evolutionary algorithms Inform. Sci. 189 2012 219 232
    • (2012) Inform. Sci. , vol.189 , pp. 219-232
    • Mohammadi, M.1    Raahemi, B.2    Akbari, A.3    Nassersharif, B.4    Moeinzadeh, H.5
  • 30
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir How to share a secret Commun. ACM 22 11 1979 612 613
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 31
    • 78649437877 scopus 로고    scopus 로고
    • Image encryption with multiorders of fractional fourier transforms
    • Ran Tao, Xiang-Yi Meng, and Yue Wang Image encryption with multiorders of fractional fourier transforms IEEE Trans. Inform. Forensics Sec. 5 4 2010 734 738
    • (2010) IEEE Trans. Inform. Forensics Sec. , vol.5 , Issue.4 , pp. 734-738
    • Tao, R.1    Meng, X.-Y.2    Wang, Y.3
  • 32
    • 84889090038 scopus 로고    scopus 로고
    • Doccloud: A document recommender system on cloud computing with plausible deniability
    • Juan Vera-del Campo, Josep Pegueroles, Juan Hernández-Serrano, and Miguel Soriano Doccloud: a document recommender system on cloud computing with plausible deniability Inform. Sci. 258 2014 387 402
    • (2014) Inform. Sci. , vol.258 , pp. 387-402
    • Campo, J.V.-D.1    Pegueroles, J.2    Hernández-Serrano, J.3    Soriano, M.4
  • 33
    • 79960862322 scopus 로고    scopus 로고
    • Secure and practical outsourcing of linear programming in cloud computing
    • IEEE
    • Cong Wang, Kui Ren, and Jia Wang Secure and practical outsourcing of linear programming in cloud computing INFOCOM, 2011 Proceedings 2011 IEEE 820 828
    • (2011) INFOCOM, 2011 Proceedings , pp. 820-828
    • Wang, C.1    Ren, K.2    Wang, J.3
  • 34
    • 84877785052 scopus 로고    scopus 로고
    • Harnessing the cloud for securely outsourcing large-scale systems of linear equations
    • Cong Wang, Qian Wang, Kui Ren, and Jia Wang Harnessing the cloud for securely outsourcing large-scale systems of linear equations IEEE Trans. Parallel Distrib. Syst. 24 6 2013 1172 1181
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.6 , pp. 1172-1181
    • Wang, C.1    Wang, Q.2    Ren, K.3    Wang, J.4
  • 35
    • 84889087663 scopus 로고    scopus 로고
    • Security and privacy for storage and computation in cloud computing
    • Lifei Wei, Haojin Zhu, Zhenfu Cao, Xiaolei Dong, Weiwei Jia, Yunlu Chen, and Athanasios V. Vasilakos Security and privacy for storage and computation in cloud computing Inform. Sci. 258 2014 371 386
    • (2014) Inform. Sci. , vol.258 , pp. 371-386
    • Wei, L.1    Zhu, H.2    Cao, Z.3    Dong, X.4    Jia, W.5    Chen, Y.6    Vasilakos, A.V.7
  • 36
    • 84875453568 scopus 로고    scopus 로고
    • K-local hyperplane distance nearest neighbor classifier oriented local discriminant analysis
    • Jie Xu, Jian Yang, and Zhihui Lai K-local hyperplane distance nearest neighbor classifier oriented local discriminant analysis Inform. Sci. 232 2013 11 26
    • (2013) Inform. Sci. , vol.232 , pp. 11-26
    • Xu, J.1    Yang, J.2    Lai, Z.3
  • 38
    • 79251594543 scopus 로고    scopus 로고
    • A chaos-based symmetric image encryption scheme using a bit-level permutation
    • Zhi-liang Zhu, Wei Zhang, Kwok-wo Wong, and Hai Yu A chaos-based symmetric image encryption scheme using a bit-level permutation Inform. Sci. 181 6 2011 1171 1186
    • (2011) Inform. Sci. , vol.181 , Issue.6 , pp. 1171-1186
    • Zhu, Z.-L.1    Zhang, W.2    Wong, K.-W.3    Yu, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.