东北大学学报(自然科学版) ›› 2013, Vol. 34 ›› Issue (6): 786-791.DOI: -

• 信息与控制 • 上一篇    下一篇

云计算中安全的向量点积计算

盛刚1,温涛1,郭权2,印莹3   

  1. (1.东北大学软件中心,辽宁沈阳110819;2.大连东软信息学院计算机科学与技术系,辽宁大连116023;3.东北大学信息科学与工程学院,辽宁沈阳110819)
  • 收稿日期:2012-11-08 修回日期:2012-11-08 出版日期:2013-06-15 发布日期:2013-12-31
  • 通讯作者: 盛刚
  • 作者简介:盛刚(1978-),男,山东烟台人,东北大学博士研究生;温涛(1962-),男,陕西宝鸡人,东北大学教授,博士生导师.
  • 基金资助:
    国家自然科学基金资助项目(61170169,61170168,61100028);新世纪优秀人才支持计划项目(NCET-11-0085);中央高校基本科研业务费专项资金资助项目(N110404017).

Secure Scalar Product Computation of Vectors in Cloud Computing

SHENG Gang1, WEN Tao1, GUO Quan2, YIN Ying3   

  1. 1. Software Center, Northeastern University, Shenyang 110819, China; 2. Department of Computer Science and Technology, Dalian Neusoft University of Information, Dalian 116023, China; 3. School of Information Science & Engineering, Northeastern University, Shenyang 110819, China.
  • Received:2012-11-08 Revised:2012-11-08 Online:2013-06-15 Published:2013-12-31
  • Contact: SHENG Gang
  • About author:-
  • Supported by:
    -

摘要: 安全问题是云计算研究的关键问题之一.提出云计算模型中安全的向量点积计算方案,同时提供计算结果的正确性验证和数据的隐私保护功能.通过分析向量和向量点积的代数性质,为数据所有者端的原始向量构建转换向量和影子向量,使客户能够验证计算结果的正确性.将现有两方间隐私保护的向量点积计算协议扩展到云计算模型中的三方.安全性分析表明该方案能够抵御多种可能的威胁.实验结果表明了该方案的高效性.

关键词: 云计算, 向量点积, 正确性验证, 隐私保护

Abstract: The security problem is one of the key issues of cloud computing research. A secure scalar product computation scheme of vectors was presented in the cloud computing model, which provided correctness verification for computation result and privacy preservation for data simultaneously. Based on the algebraic properties of vector and scalar product of vectors, the transformation vector and mirror vector were constructed for the original vector, which enabled the client to verify the correctness of the computation results. The existing privacy preserving scalar product computation protocol of vectors between two parties was extended to three parties in the cloud computing model. Security analysis demonstrated that the scheme could resist a variety of possible threats. Experimental results showed the efficiency of the scheme.

Key words: cloud computing, scalar product of vectors, correctness verification, privacy preservation

中图分类号: