Skip to main content
Erschienen in:
Buchtitelbild

2017 | OriginalPaper | Buchkapitel

Practical Privacy-Preserving Outsourcing of Large-Scale Matrix Determinant Computation in the Cloud

verfasst von : Shaojing Fu, Yunpeng Yu, Ming Xu

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Large-Scale matrix determinant computation (LMDC) is a common scientific and engineering computational task and has a number of applications. But such computation involves enormous computing resources, which is burdensome for the clients. Cloud computing enables computational resource-constrained clients to economically outsource such computations to the cloud server. In this paper, we investigate the privacy-preserving large-scale matrix determinant computation outsourcing problem, where the clients can outsource LMDC to the untrusted cloud server, relieving the clients from computation burden. We propose a new privacy-preserving algorithm for outsourcing LMDC, which substantially reduces the computation burden on the client side. Our algorithm builds on a series of carefully-designed pseudorandom matrices, which can hide the original matrix from the cloud server with low computational complexity. The extensive security analysis shows that our algorithm is practically-secure, and offers a higher level of privacy protection than the state-of-the-art on LMDC outsourcing. We provide extensive theoretical analysis and experimental evaluation to show its high-efficiency and security compared to the previous works.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Demirkan, H., Delen, D.: Leveraging the capabilities of service-oriented decision support systems: putting analytics and big data in cloud. Decis. Support Sys. 55, 412–421 (2013)CrossRef Demirkan, H., Delen, D.: Leveraging the capabilities of service-oriented decision support systems: putting analytics and big data in cloud. Decis. Support Sys. 55, 412–421 (2013)CrossRef
2.
Zurück zum Zitat Wang, Q., Hu, S., Ren, K., He, M., Du, M., Wang, Z.: CloudBI: practical privacy-preserving outsourcing of biometric identification in the cloud. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9327, pp. 186–205. Springer, Cham (2015). doi:10.1007/978-3-319-24177-7_10 CrossRef Wang, Q., Hu, S., Ren, K., He, M., Du, M., Wang, Z.: CloudBI: practical privacy-preserving outsourcing of biometric identification in the cloud. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9327, pp. 186–205. Springer, Cham (2015). doi:10.​1007/​978-3-319-24177-7_​10 CrossRef
3.
Zurück zum Zitat Fu, Z., Ren, K., Shu, J., et al.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27, 2546–2559 (2016)CrossRef Fu, Z., Ren, K., Shu, J., et al.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27, 2546–2559 (2016)CrossRef
4.
Zurück zum Zitat Xia, Z., Wang, X., et al.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11, 2594–2608 (2016)CrossRef Xia, Z., Wang, X., et al.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11, 2594–2608 (2016)CrossRef
5.
Zurück zum Zitat Sakr, S., et al.: A survey of large scale data management approaches in cloud environments. IEEE Commun. Surv. Tutor. 13, 311–336 (2011)CrossRef Sakr, S., et al.: A survey of large scale data management approaches in cloud environments. IEEE Commun. Surv. Tutor. 13, 311–336 (2011)CrossRef
6.
Zurück zum Zitat Peng, B.: The Determinant: A Means to Calculate Volume (2011) Peng, B.: The Determinant: A Means to Calculate Volume (2011)
7.
Zurück zum Zitat Biswas, S.N., et al.: The hill determinant: an application to the anharmonic oscillator. Phys. Rev. D 4, 3617–3620 (1971)CrossRef Biswas, S.N., et al.: The hill determinant: an application to the anharmonic oscillator. Phys. Rev. D 4, 3617–3620 (1971)CrossRef
8.
Zurück zum Zitat Seccombe, A., et al.: Security guidance for critical areas of focus in cloud computing. Evidence and Cloud Computing the VMI Approach Poisel Malzer and Tjoa (2009) Seccombe, A., et al.: Security guidance for critical areas of focus in cloud computing. Evidence and Cloud Computing the VMI Approach Poisel Malzer and Tjoa (2009)
9.
Zurück zum Zitat Mohassel, P.: Efficient and Secure Delegation of Linear Algebra. IACR Cryptology Eprint Archive (2011) Mohassel, P.: Efficient and Secure Delegation of Linear Algebra. IACR Cryptology Eprint Archive (2011)
10.
Zurück zum Zitat Lei, X., et al.: Cloud computing service: the case of large matrix determinant computation. IEEE Trans. Serv. Comput. 8, 688–700 (2015)CrossRef Lei, X., et al.: Cloud computing service: the case of large matrix determinant computation. IEEE Trans. Serv. Comput. 8, 688–700 (2015)CrossRef
11.
Zurück zum Zitat Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465–482. Springer, Heidelberg (2010). doi:10.1007/978-3-642-14623-7_25 CrossRef Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465–482. Springer, Heidelberg (2010). doi:10.​1007/​978-3-642-14623-7_​25 CrossRef
12.
Zurück zum Zitat Yu, Y., et al.: Efficient, secure and non-iterative outsourcing of large-scale systems of linear equations. In: 2016 IEEE International Conference on Communications, pp. 1–6. IEEE Press, Kuala Lumpur (2016) Yu, Y., et al.: Efficient, secure and non-iterative outsourcing of large-scale systems of linear equations. In: 2016 IEEE International Conference on Communications, pp. 1–6. IEEE Press, Kuala Lumpur (2016)
13.
Zurück zum Zitat Katz, J., Lindell, Y.: Introduction to Modern Cryptography: Principles and Protocols. Chapman & Hall/CRC, Boca Raton (2007)MATH Katz, J., Lindell, Y.: Introduction to Modern Cryptography: Principles and Protocols. Chapman & Hall/CRC, Boca Raton (2007)MATH
14.
Zurück zum Zitat Salinas, S., et al.: Efficient secure outsourcing of large-scale linear systems of equations. In: 2015 International Conference on Computer Communications, pp. 1035–1043. IEEE Press, Hong Kong (2015) Salinas, S., et al.: Efficient secure outsourcing of large-scale linear systems of equations. In: 2015 International Conference on Computer Communications, pp. 1035–1043. IEEE Press, Hong Kong (2015)
15.
Zurück zum Zitat Meyer, C.D.: Matrix Analysis and Applied Linear Algebra. Society for Industrial and Applied Mathematics, Philadelphia (2000)CrossRef Meyer, C.D.: Matrix Analysis and Applied Linear Algebra. Society for Industrial and Applied Mathematics, Philadelphia (2000)CrossRef
16.
Zurück zum Zitat Matsumoto, M., Nishimura, T.: Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Trans. Model Comput. Simul. 8, 3–30 (1998)CrossRefMATH Matsumoto, M., Nishimura, T.: Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Trans. Model Comput. Simul. 8, 3–30 (1998)CrossRefMATH
Metadaten
Titel
Practical Privacy-Preserving Outsourcing of Large-Scale Matrix Determinant Computation in the Cloud
verfasst von
Shaojing Fu
Yunpeng Yu
Ming Xu
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-68542-7_1