{"title":"利用稀疏矩阵防止云计算中的信息泄漏","authors":"K. Khan, Mahboob Shaheen, Yongge Wang","doi":"10.1109/FiCloud.2018.00070","DOIUrl":null,"url":null,"abstract":"Cloud computing represents the promise of outsourcing of scientific computing such as matrix multiplication. However, this can introduce new vulnerabilities such as information leakage. Cloud server intentionally or unintentionally may reveal sensitive input matrices of the client as well as multiplication results to unauthorised entities. In this paper, we propose two protocols that use sparse matrices to prevent information leakage in outsourcing matrix multiplications to cloud computing without encryption. The protocols are considered lightweight compared to other comparable approaches. We also provide a running example to demonstrate how the protocols ensure no information leakage of client data.","PeriodicalId":174838,"journal":{"name":"2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Using Sparse Matrices to Prevent Information Leakage in Cloud Computing\",\"authors\":\"K. Khan, Mahboob Shaheen, Yongge Wang\",\"doi\":\"10.1109/FiCloud.2018.00070\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing represents the promise of outsourcing of scientific computing such as matrix multiplication. However, this can introduce new vulnerabilities such as information leakage. Cloud server intentionally or unintentionally may reveal sensitive input matrices of the client as well as multiplication results to unauthorised entities. In this paper, we propose two protocols that use sparse matrices to prevent information leakage in outsourcing matrix multiplications to cloud computing without encryption. The protocols are considered lightweight compared to other comparable approaches. We also provide a running example to demonstrate how the protocols ensure no information leakage of client data.\",\"PeriodicalId\":174838,\"journal\":{\"name\":\"2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FiCloud.2018.00070\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FiCloud.2018.00070","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Using Sparse Matrices to Prevent Information Leakage in Cloud Computing
Cloud computing represents the promise of outsourcing of scientific computing such as matrix multiplication. However, this can introduce new vulnerabilities such as information leakage. Cloud server intentionally or unintentionally may reveal sensitive input matrices of the client as well as multiplication results to unauthorised entities. In this paper, we propose two protocols that use sparse matrices to prevent information leakage in outsourcing matrix multiplications to cloud computing without encryption. The protocols are considered lightweight compared to other comparable approaches. We also provide a running example to demonstrate how the protocols ensure no information leakage of client data.