Data confidentiality and integrity preserving outsourcing algorithm for matrix chain multiplication over malicious cloud server

被引:3
作者
Kumar, Malay [1 ]
Vardhan, Manu [1 ]
机构
[1] Natl Inst Technol Raipur, Dept Comp Sci & Engn, GE Rd, Raipur 492010, Chhattisgarh, India
关键词
Matrix-chain multiplication; cloud computing; secure outsourcing; security; verifiability; LARGE-SCALE SYSTEMS; COMPUTATION;
D O I
10.3233/JIFS-169422
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing offers an economical, convenient and elastic pool of computing resources over the internet. It enables computationally weak client to execute large computations by outsourcing their computation load to the cloud servers. However, outsourcing of data and computation to the third-party cloud servers bring multifarious security and privacy challenges that needed to be understood and address before the development of outsourcing algorithm. In this paper, the authors propose solutions for matrix-chain multiplication (MCM) problem. Our goal is to minimize the execution burden on the client without sacrificing the confidentiality and integrity of the input/output. Conventionally, the complexity of matrix-chain multiplication is O(n(3)). After leveraging the facility of outsourcing, the client-side complexity reduces to O(n(2)). In the proposed algorithm, the client employs some efficient linear transformation schemes, which preserve the data confidentiality. It also developed a novel result verification scheme, which verifies the result with modest burden and high probability and maintain the integrity of computed result. The analytical analysis of algorithm depicted that the algorithm is simultaneously meeting the design goals of correctness, security, efficiency and verifiability. We conduct many experiments to validate the algorithm and demonstrate its practical usability. The algorithm is implemented on public cloud "Amazon EC2", and found that the proposed outsource algorithm performs 11.655 times faster computation of matrix-chain multiplication than the direct implementation.
引用
收藏
页码:1251 / 1263
页数:13
相关论文
共 28 条
[1]  
[Anonymous], 2011, NIST DEFINITION CLOU
[2]  
Atallah Mikhail J., 2012, Proceedings of the 7th International Conference on Security and Cryptography. SECRYPT 2012, P136
[3]  
Atallah M.J., 2010, Proc. ACM Symp. on Information, P48, DOI DOI 10.1145/1755688.1755695
[4]   Private and Cheating-Free Outsourcing of Algebraic Computations [J].
Benjamin, David ;
Atallah, Mikhail L. .
SIXTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PROCEEDINGS, 2008, :240-245
[5]   Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud [J].
Chen, Fei ;
Xiang, Tao ;
Yang, Yuanyuan .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2014, 74 (03) :2141-2151
[6]   Publicly Verifiable Delegation of Matrix Operation [J].
Chen, Lu ;
Zhu, Yan-Qin .
2015 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CCBD), 2015, :377-384
[7]   New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations [J].
Chen, Xiaofeng ;
Huang, Xinyi ;
Li, Jin ;
Ma, Jianfeng ;
Lou, Wenjing ;
Wong, Duncan S. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (01) :69-78
[8]   New Algorithms for Secure Outsourcing of Modular Exponentiations [J].
Chen, Xiaofeng ;
Li, Jin ;
Ma, Jianfeng ;
Tang, Qiang ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (09) :2386-2396
[9]   Highly Efficient Linear Regression Outsourcing to a Cloud [J].
Fei Chen ;
Tao Xiang ;
Lei, Xinyu ;
Chen, Jianyong .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2014, 2 (04) :499-508
[10]  
Fiore D., 2012, PUBLICLY VERIFIABLE, P1