Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Special section: Soft Computing and Intelligent Systems: Techniques and Applications
Guest editors: Sabu M. Thampi, El-Sayed M. El-Alfy and Ljiljana Trajkovic
Article type: Research Article
Authors: Kumar, Malaya; * | Mishra, Vaibhavb | Shukla, Anuragc | Singh, Munendrad | Vardhan, Manuc
Affiliations: [a] Department of Computer Science and Engineering, Indian Institute of Information Technology Dharwad, Karnataka, India | [b] Department of Operations and IT, ICFAI Business School Hyderabad, IFHE University, Hyderabad, India | [c] Department of Computer Science and Engineering, National Institute of Information Technology Raipur, Chhattisgarh, India | [d] Department of Mechatronics Engineering, Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal, Karnataka, India
Correspondence: [*] Corresponding author. Malay Kumar, Department of Computer Science and Engineering, Indian Institute of Information Technology Dharwad, Karnataka, India. E-mail: [email protected].
Abstract: Computation of complex mathematical problems are always a challenge of resource constrained clients. A client can outsource the computations to resource abundant cloud server for execution. But this arrangement brings many security and privacy challenges. In this paper, we have presented a secure and efficient algorithm for general computation and scientific problem i.e. matrix multiplication. The proposed algorithm is inspired by the existing algorithm, but we believe that it is imperative to improve the algorithm to enable secure outsourcing of computation. The previous state-of-the art algorithm for matrix multiplication is vulnerable to the Cipher-Text Only Attack (COA) along with Chosen Cipher-Text Attack (CCA) and Known Plain-Text Attack (KPA) and reveal information about the client’s data. Hence fails the security requirements of the outsourcing algorithm. The proposed work retains the efficiency benefit of state-of-the-art algorithm, additionally defended the client data against (COA) along with (CCA) and Known Plain-Text Attack (KPA).
Keywords: Matrix multiplication, cloud computing, secure outsourcing, security, verifiability, Cipher-Text Only Attack (COA), Chosen Cipher-Text Attack (CCA) and Known Plain-Text Attack (KPA)
DOI: 10.3233/JIFS-179725
Journal: Journal of Intelligent & Fuzzy Systems, vol. 38, no. 5, pp. 6445-6455, 2020
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]