Journal of Northeastern University ›› 2013, Vol. 34 ›› Issue (6): 786-791.DOI: -

• Information & Control • Previous Articles     Next Articles

Secure Scalar Product Computation of Vectors in Cloud Computing

SHENG Gang1, WEN Tao1, GUO Quan2, YIN Ying3   

  1. 1. Software Center, Northeastern University, Shenyang 110819, China; 2. Department of Computer Science and Technology, Dalian Neusoft University of Information, Dalian 116023, China; 3. School of Information Science & Engineering, Northeastern University, Shenyang 110819, China.
  • Received:2012-11-08 Revised:2012-11-08 Online:2013-06-15 Published:2013-12-31
  • Contact: SHENG Gang
  • About author:-
  • Supported by:
    -

Abstract: The security problem is one of the key issues of cloud computing research. A secure scalar product computation scheme of vectors was presented in the cloud computing model, which provided correctness verification for computation result and privacy preservation for data simultaneously. Based on the algebraic properties of vector and scalar product of vectors, the transformation vector and mirror vector were constructed for the original vector, which enabled the client to verify the correctness of the computation results. The existing privacy preserving scalar product computation protocol of vectors between two parties was extended to three parties in the cloud computing model. Security analysis demonstrated that the scheme could resist a variety of possible threats. Experimental results showed the efficiency of the scheme.

Key words: cloud computing, scalar product of vectors, correctness verification, privacy preservation

CLC Number: