Efficient Secure Outsourcing of Large-Scale Convex Separable Programming for Big Data

被引:14
作者
Liao, Weixian [1 ]
Luo, Changqing [1 ]
Salinas, Sergio [2 ]
Li, Pan [1 ]
机构
[1] Case Western Reserve Univ, Dept Elect Engn & Comp Sci, Cleveland, OH 44106 USA
[2] Wichita State Univ, Dept Elect Engn & Comp Sci, Wichita, KS 67260 USA
基金
美国国家科学基金会;
关键词
Convex separable programming; cloud computing; data security and privacy; big data; CLOUD; COMPUTATION; SYSTEMS; SERVICE;
D O I
10.1109/TBDATA.2017.2787198
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Big data has become a key basis of innovation and intelligence, potentially making our lives more convenient and bringing new opportunities to the modern society. Towards this goal, a critical underlying task is to solve a series of large-scale fundamental problems. Conducting such large-scale data analytics in a timely manner requires a large amount of computing resources, which may not be available for individuals and small companies in practice. By outsourcing their computations to the cloud, clients can solve such problems in a cost-effective way. However, confidential data stored at the cloud is vulnerable to cyber attacks, and thus needs to be protected. Previous works employ cryptographic techniques like homomorphic encryption, which significantly increase the computational complexity of solving a large-scale problem at the cloud and is impractical for big data applications. For the first time in the literature, we present an efficient secure outsourcing scheme for convex separable programming problems (CSPs). In particular, we first develop efficient matrix and vector transformation schemes only based on arithmetic operations that are computationally indistinguishable both in value and in structure under a chosen-plaintext attack (CPA). Then, we design a secure outsourcing scheme in which the client and the cloud collaboratively solve the transformed problems. The client can efficiently verify the correctness of returned results to prevent any malicious behavior of the cloud. Theoretical correctness and privacy analysis together show that the proposed scheme obtains optimal results and that the cloud cannot learn private information from the client's concealed data. We conduct extensive simulations on Amazon Elastic Cloud Computing (EC2) platform and find that our proposed scheme provides significant time savings to the clients.
引用
收藏
页码:368 / 378
页数:11
相关论文
共 50 条
  • [31] Privacy-Preserving and Secure Cloud Computing: A Case of Large-Scale Nonlinear Programming
    Du, Wei
    Li, Ang
    Li, Qinghua
    Zhou, Pan
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 484 - 498
  • [32] Efficient Privacy-preserving Outsourcing of Large-scale QR Factorization
    Luo, Changqing
    Zhang, Kaijin
    Salinas, Sergio
    Li, Pan
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 917 - 924
  • [33] A novel large-scale task processing approach for big data across multi-domain
    Wu, Chunyi
    Xu, Gaochao
    Zhao, Jia
    Ding, Yan
    ADVANCES IN MECHANICAL ENGINEERING, 2018, 10 (12):
  • [34] A Secure Mechanism for Big Data Collection in Large Scale Internet of Vehicle
    Guo, Longhua
    Dong, Mianxiong
    Ota, Kaoru
    Li, Qiang
    Ye, Tianpeng
    Wu, Jun
    Li, Jianhua
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (02): : 601 - 610
  • [35] Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud
    Yang, Kan
    Jia, Xiaohua
    Ren, Kui
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (12) : 3461 - 3470
  • [36] Performance Evaluation of Big Data Frameworks for Large-Scale Data Analytics
    Veiga, Jorge
    Exposito, Roberto R.
    Pardo, Xoan C.
    Taboada, Guillermo L.
    Tourino, Juan
    2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2016, : 424 - 431
  • [37] Building a Big Data Platform for Large-scale Security Data Analysis
    Lee, Jong-Hoon
    Kim, Young Soo
    Kim, Jong Hyun
    Kim, Ik Kyun
    Han, Ki-Jun
    2017 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2017, : 976 - 980
  • [38] A fully distributed dual gradient method with linear convergence for large-scale separable convex problems
    Necoara, Ion
    Nedich, Angelia
    2015 EUROPEAN CONTROL CONFERENCE (ECC), 2015, : 304 - 309
  • [39] BIG: a large-scale data integration tool for renal physiology
    Zhao, Yue
    Yang, Chin-Rang
    Raghuram, Viswanathan
    Parulekar, Jaya
    Knepper, Mark A.
    AMERICAN JOURNAL OF PHYSIOLOGY-RENAL PHYSIOLOGY, 2016, 311 (04) : F787 - F792
  • [40] Big Data Collection in Large-Scale Wireless Sensor Networks
    Djedouboum, Asside Christian
    Ari, Ado Adamou Abba
    Gueroui, Abdelhak Mourad
    Mohamadou, Alidou
    Aliouat, Zibouda
    SENSORS, 2018, 18 (12)