Secure and Verifiable Outsourcing of Large-scale Matrix Inversion without Precondition in Cloud Computing

被引:0
作者
Chen, Zhenzhu [1 ]
Fu, Anmin [1 ]
Xiao, Ke [2 ]
Su, Mang [1 ]
Yu, Yan [1 ]
Wang, Yongli [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing, Peoples R China
[2] North China Univ Technol, Sch Comp Sci & Technol, Beijing, Peoples R China
来源
2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2018年
基金
美国国家科学基金会;
关键词
Cloud Computing; Outsourcing Computation; atrix Inversion; SYSTEMS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Large-scale matrix computation requires a lot of computing resources, but the emergence of cloud computing provides resource-limited users with an economical solution, namely outsourcing computation. Clients can use pay-per-use service of cloud resources to solve complex issues, such as matrix inversion. However, due to the inclusion of privacy information in users' data and the opacity of the calculation operations, clients are in face of the threats of privacy disclosure and fraud. In this paper, we first propose an efficient and secure scheme without precondition for outsourcing large-scale matrix inversion to a public cloud. Compared to the state-of-the-art schemes, our scheme does not require the precondition that the original matrix should be invertible. It relieves clients from checking the invertibility of matrix, which is hard to be implemented with limited resource in reality. Moreover, our scheme can protect clients from being cheated and provide data privacy protection. Experiment results also show that our scheme is highly efficient in practical.
引用
收藏
页数:6
相关论文
共 24 条
[1]  
[Anonymous], 2017, IEEE T BIG DATA, DOI DOI 10.1109/TBDATA.2017.2701347
[2]  
Atallah M.J., 1996, SECURE OUTSOURCING S
[3]  
Atallah M.J., 2010, Proc. ACM Symp. on Information, P48, DOI DOI 10.1145/1755688.1755695
[4]   Private and Cheating-Free Outsourcing of Algebraic Computations [J].
Benjamin, David ;
Atallah, Mikhail L. .
SIXTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PROCEEDINGS, 2008, :240-245
[5]   New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations [J].
Chen, Xiaofeng ;
Huang, Xinyi ;
Li, Jin ;
Ma, Jianfeng ;
Lou, Wenjing ;
Wong, Duncan S. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (01) :69-78
[6]  
Diwu CR, 2016, SPR GEOL, P29, DOI 10.1007/978-981-10-1064-4_2
[7]  
Hu CQ, 2017, IEEE INFOCOM SER
[8]   Spatial-temporal analysis of pulmonary tuberculosis in the northeast of the Yunnan province, People's Republic of China [J].
Huang, Li ;
Li, Xin-Xu ;
Abe, Eniola Michael ;
Xu, Lin ;
Ruan, Yao ;
Cao, Chun-Li ;
Li, Shi-Zhu .
INFECTIOUS DISEASES OF POVERTY, 2017, 6
[9]   Enabling Efficient and Secure Outsourcing of Large Matrix Multiplications [J].
Jia, Kun ;
Li, Hongwei ;
Liu, Dongxiao ;
Yu, Shui .
2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
[10]   Cloud Computing Service: The Case of Large Matrix Determinant Computation [J].
Lei, Xinyu ;
Liao, Xiaofeng ;
Huang, Tingwen ;
Li, Huaqing .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2015, 8 (05) :688-700