Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud

被引:54
作者
Chen, Fei [1 ]
Xiang, Tao [2 ]
Yang, Yuanyuan [3 ]
机构
[1] Chinese Univ Hong Kong, Dept Comp Sci & Engn, Hong Kong, Hong Kong, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing 630044, Peoples R China
[3] SUNY Stony Brook, Dept Elect & Comp Engn, Stony Brook, NY 11794 USA
基金
中国国家自然科学基金;
关键词
Computation outsourcing; Linear equation solving; Linear programming; Cloud computing; Distributed computing; LARGE-SCALE SYSTEMS; DELEGATION; SECURE;
D O I
10.1016/j.jpdc.2013.11.007
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Computation outsourcing to the cloud has become a popular application in the age of cloud computing. Recently, two protocols for secure outsourcing scientific computations, i.e., linear equation solving and linear programming solving, to the cloud were proposed. In this paper, we improve the work by proposing new protocols that achieve significant performance gains. For linear equation solving outsourcing, we achieve the improvement by proposing a completely new protocol. The new protocol employs some special linear transformations and there are no homomorphic encryptions and interactions between the client and the cloud, compared with the previous protocol. For linear programming outsourcing, we achieve the improvement by reformulating the linear programming problem in the standard and natural form. We also introduce a method to reduce the key size by using a pseudorandom number generator. The design of the newly proposed protocols also sheds some insight on constructing secure outsourcing protocols for other scientific computations. Comparisons between our protocols and the previous protocols are given, which demonstrate significant improvements of our proposed protocols. We also carry out numerical experiments to validate the efficiency of our protocols for secure linear equation solving and linear programming outsourcing. (C) 2013 Elsevier Inc. All rights reserved.
引用
收藏
页码:2141 / 2151
页数:11
相关论文
共 37 条
[1]  
[Anonymous], 2012, MATH PUBLIC KEY CRYP
[2]  
[Anonymous], OPTIM LETT
[3]  
[Anonymous], 1979, COMPUTERS INTRACTABI
[4]  
[Anonymous], 2001, INTRO ALGORITHMS
[5]  
[Anonymous], 2003, ITERATIVE METHODS SP, DOI DOI 10.1137/1.9780898718003
[6]  
Atallah MJ, 2001, ADV COMPUT, V54, P215
[7]  
Benabbas S, 2011, LECT NOTES COMPUT SC, V6841, P111, DOI 10.1007/978-3-642-22792-9_7
[8]   HOW TO GENERATE CRYPTOGRAPHICALLY STRONG SEQUENCES OF PSEUDO-RANDOM BITS [J].
BLUM, M ;
MICALI, S .
SIAM JOURNAL ON COMPUTING, 1984, 13 (04) :850-864
[9]  
Boyd S., 2004, CONVEX OPTIMIZATION, VFirst, DOI DOI 10.1017/CBO9780511804441
[10]  
Chen F., 2013, SECURE LP LE OUTSOUR