Privacy-Preserving and Secure Cloud Computing: A Case of Large-Scale Nonlinear Programming

被引:2
|
作者
Du, Wei [1 ]
Li, Ang [2 ]
Li, Qinghua [1 ]
Zhou, Pan [3 ]
机构
[1] Univ Arkansas, Dept Comp Sci & Comp Engn, Fayetteville, AR 72701 USA
[2] Duke Univ, Dept Elect & Comp Engn, Durham, NC 27708 USA
[3] Huazhong Univ Sci & Technol, Sch Elect Informat & Commun, Wuhan 430074, Peoples R China
关键词
Cloud computing; Servers; Privacy; Outsourcing; Protocols; Gradient methods; Task analysis; privacy; security; nonlinear programming; SUPPORT VECTOR MACHINE; LARGE MATRIX; COMPUTATION; CHALLENGES; EFFICIENT;
D O I
10.1109/TCC.2021.3099720
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The volume of data is increasing rapidly, which poses a great challenge for resource-constrained users to process and analyze. A promising approach for solving computation-intensive tasks over big data is to outsource them to the cloud to take advantage of the cloud's powerful computing capability. However, it also brings privacy and security issues since the data uploaded to the cloud may contain sensitive and private information which should be protected. In this article, we address this problem and focus on the privacy-preserving and secure outsourcing of large-scale nonlinear programming problems (NLPs) subject to both linear constraints and nonlinear constraints. Large-scale NLPs play an important role in the field of data analytics but have not received enough attention in the context of cloud computing. In our outsourcing protocol, we first apply a secure and efficient transformation scheme at the client side to encrypt the private information of the considered NLP. Then, we use the reduced gradient method and generalized gradient method at the server side to solve the transformed large-scale NLPs under linear constraints and nonlinear constraints, respectively. We provide security analysis of the proposed protocol, and evaluate its performance via a series of experiments. The experimental results show that our protocol can efficiently solve large-scale NLPs and save much time for the client, providing a great potential for real applications.
引用
收藏
页码:484 / 498
页数:15
相关论文
共 50 条
  • [1] Privacy-Preserving Outsourcing of Large-Scale Nonlinear Programming to the Cloud
    Li, Ang
    Du, Wei
    Li, Qinghua
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 569 - 587
  • [2] Efficient Privacy-Preserving Outsourcing of Large-Scale Geometric Programming
    Bao, Wei
    Li, Qinghua
    2018 IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), 2018, : 55 - 63
  • [3] Secure Index Construction for Privacy-Preserving Large-scale Image Retrieval
    Cheng, Bo
    Zhuo, Li
    Bai, Yu
    Peng, Yuanfan
    Zhang, Jing
    2014 IEEE FOURTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING (BDCLOUD), 2014, : 116 - 120
  • [4] Practical Privacy-Preserving Outsourcing of Large-Scale Matrix Determinant Computation in the Cloud
    Fu, Shaojing
    Yu, Yunpeng
    Xu, Ming
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 3 - 15
  • [5] A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing
    Qin, Zhen
    Sun, Jianfei
    Wahaballa, Abubaker
    Zheng, Wentao
    Xiong, Hu
    Qin, Zhiguang
    COMPUTER STANDARDS & INTERFACES, 2017, 54 : 55 - 60
  • [6] Efficient Privacy-preserving Outsourcing of Large-scale Convex Separable Programming for Smart Cities
    Liao, Weixian
    Du, Wei
    Salinas, Sergio
    Li, Pan
    PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2016, : 1349 - 1356
  • [7] Secure and Privacy-Preserving Identity Management in the Cloud
    Zwattendorfer, Bernd
    Krenn, Stephan
    Loruenser, Thomas
    ERCIM NEWS, 2016, (104): : 44 - +
  • [8] Secure and Privacy-Preserving Database Services in the Cloud
    Agrawal, Divyakant
    El Abbadi, Amr
    Wang, Shiyuan
    2013 IEEE 29TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2013, : 1268 - 1271
  • [9] Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing
    Huang, Qin-Long
    Ma, Zhao-Feng
    Yang, Yi-Xian
    Fu, Jing-Yi
    Niu, Xin-Xin
    Journal of China Universities of Posts and Telecommunications, 2013, 20 (06): : 88 - 95
  • [10] Privacy-Preserving and Secure Sharing of PHR in the Cloud
    Leyou Zhang
    Qing Wu
    Yi Mu
    Jingxia Zhang
    Journal of Medical Systems, 2016, 40