Secure Scalar Product Computation of Vectors in Cloud Computing
SHENG Gang1, WEN Tao1, GUO Quan2, YIN Ying3
1. Software Center, Northeastern University, Shenyang 110819, China; 2. Department of Computer Science and Technology, Dalian Neusoft University of Information, Dalian 116023, China; 3. School of Information Science & Engineering, Northeastern University, Shenyang 110819, China.
[1] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71/83.(Feng Dengguo,Zhang Min,Zhang Yan,et al.Study on cloud computing security[J].Journal of Software,2011,22(1):71/83.) [2] Vaidya J,Clifton C.Privacy preserving association rule mining in vertically partitioned data[C]//Proceedings of the eighth ACM SIGKDD.Edmonton,2002:639/644. [3] Goethals B,Laur S,Lipmaa H,et al.On private scalar product computation for privacypreserving data mining[C]//Proceedings of Information Security and Cryptology/ICISC.Seoul,2004:23/25. [4] 罗永龙,黄刘生,荆巍巍,等.空间几何对象相对位置判定中的私有信息保护[J].计算机研究与发展,2006,43(3):410/416.(Luo Yonglong,Huang Liusheng,Jing Weiwei,et al.Privacy protection in the relative position determination for two spatial geometric objects[J].Journal of Computer Research and Development,2006,43(3):410/416.) [5] Murugesan M,Jiang W,Clifton C,et al.Efficient privacypreserving similar document detection[J].The VLDB Journal,2010,19(4):457/475. [6] Ahn J H,Boneh D,Camenisch J,et al.Computing on authenticated data[C]//Proceedings of the 9th Theory of Cryptography Conference.Taormina,2012:1/20. [7] Fiore D,Gennaro R.Publicly verifiable delegation of large polynomials and matrix computations with applications[C]//Proceedings of the 19th ACM Conference on Computer and Communications Security.Raleigh,2012:501/512. [8] 张敏,洪澄,陈驰.一种服务器透明的外包数据库查询验证方法[J].计算机研究与发展,2010,47(1):182/190.(Zhang Min,Hong Cheng,Chen Chi.Server transparent query authentication of outsourced database[J].Journal of Computer Research and Development,2010,47(1):182/190.) [9] Xie M,Wang H,Yin J,et al.Integrity auditing of outsourced data[C]//Proceedings of the 33rd VLDB.Vienna,2007:782/793. [10] Li F,Hadjieleftheriou M,Kollios G,et al.Authenticated index structures for aggregation queries[J].ACM Transactions on Information and System Security,2010,13(4):1/30.