Secure and Efficient Outsourcing of Large-Scale Overdetermined Systems of Linear Equations

被引:5
作者
Pan, Shiran [1 ,2 ,3 ]
Zhu, Wen-Tao [2 ]
Wang, Qiongxiao [1 ,2 ]
Chang, Bing [4 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Chinese Acad Sci, Data Assurance & Commun Secur Res Ctr, Beijing, Peoples R China
[3] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[4] Singapore Management Univ, Sch Informat Syst, Singapore, Singapore
来源
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I | 2018年 / 254卷
关键词
Linear equations; Overdetermined system; Linear least squares; Cloud computing; Verifiable outsourcing; Privacy preserving; LARGE MATRIX; CLOUD;
D O I
10.1007/978-3-030-01701-9_29
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We address overdetermined systems of linear equations, where the number of unknowns is smaller than the number of equations so that only approximate solutions exist instead of exact solutions. Such systems are prevalent in many areas of science and engineering, and finding the optimal solutions is mathematically known as the linear least squares (LLS) problem. Real-world overdetermined systems are often large-scale and computationally expensive to solve. Consequently, we are interested in connecting the LLS problem with cloud computing, where a resource-constrained client outsources the problem to a powerful but untrusted cloud. Among several security considerations is that the input of and solution to the LLS problem usually contain the client's private information, which necessitates privacy-preserving outsourcing. In this paper, we present a construction called Sells, which employs a mathematical method called QR decomposition to solve the above problem, in a masked yet verifiable manner. One advantage of adopting QR decomposition is that in certain circumstances, solving a batch of LLS problems only requires fully executing Sells once, where certain intermediate result can be reused and the overall efficiency is greatly improved. Theoretical analysis shows that our proposal is verifiable, recoverable, and privacy-preserving. Experiments demonstrate that a client can benefit from the scheme not only reduced computation cost but also accelerated problem solving.
引用
收藏
页码:529 / 548
页数:20
相关论文
共 25 条
  • [1] [Anonymous], 1997, Applied numerical linear algebra
  • [2] [Anonymous], 1974, Solving least squares problems
  • [3] Atallah MJ, 2001, ADV COMPUT, V54, P215
  • [4] Stratospheric memory and skill of extended-range weather forecasts
    Baldwin, MP
    Stephenson, DB
    Thompson, DWJ
    Dunkerton, TJ
    Charlton, AJ
    O'Neill, A
    [J]. SCIENCE, 2003, 301 (5633) : 636 - 640
  • [5] Bjorck A, 1996, NUMERICAL METHODS LE
  • [6] New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations
    Chen, Xiaofeng
    Huang, Xinyi
    Li, Jin
    Ma, Jianfeng
    Lou, Wenjing
    Wong, Duncan S.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (01) : 69 - 78
  • [7] LARGE DENSE NUMERICAL LINEAR ALGEBRA IN 1993 - THE PARALLEL COMPUTING INFLUENCE
    EDELMAN, A
    [J]. INTERNATIONAL JOURNAL OF SUPERCOMPUTER APPLICATIONS AND HIGH PERFORMANCE COMPUTING, 1993, 7 (02): : 113 - 128
  • [8] METHODS OF CONJUGATE GRADIENTS FOR SOLVING LINEAR SYSTEMS
    HESTENES, MR
    STIEFEL, E
    [J]. JOURNAL OF RESEARCH OF THE NATIONAL BUREAU OF STANDARDS, 1952, 49 (06): : 409 - 436
  • [9] Cloud Computing Service: The Case of Large Matrix Determinant Computation
    Lei, Xinyu
    Liao, Xiaofeng
    Huang, Tingwen
    Li, Huaqing
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2015, 8 (05) : 688 - 700
  • [10] Lei XY, 2013, IEEE TRANS CLOUD COM, V1, P78