Privacy-Preserving and Secure Cloud Computing: A Case of Large-Scale Nonlinear Programming

被引:2
|
作者
Du, Wei [1 ]
Li, Ang [2 ]
Li, Qinghua [1 ]
Zhou, Pan [3 ]
机构
[1] Univ Arkansas, Dept Comp Sci & Comp Engn, Fayetteville, AR 72701 USA
[2] Duke Univ, Dept Elect & Comp Engn, Durham, NC 27708 USA
[3] Huazhong Univ Sci & Technol, Sch Elect Informat & Commun, Wuhan 430074, Peoples R China
关键词
Cloud computing; Servers; Privacy; Outsourcing; Protocols; Gradient methods; Task analysis; privacy; security; nonlinear programming; SUPPORT VECTOR MACHINE; LARGE MATRIX; COMPUTATION; CHALLENGES; EFFICIENT;
D O I
10.1109/TCC.2021.3099720
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The volume of data is increasing rapidly, which poses a great challenge for resource-constrained users to process and analyze. A promising approach for solving computation-intensive tasks over big data is to outsource them to the cloud to take advantage of the cloud's powerful computing capability. However, it also brings privacy and security issues since the data uploaded to the cloud may contain sensitive and private information which should be protected. In this article, we address this problem and focus on the privacy-preserving and secure outsourcing of large-scale nonlinear programming problems (NLPs) subject to both linear constraints and nonlinear constraints. Large-scale NLPs play an important role in the field of data analytics but have not received enough attention in the context of cloud computing. In our outsourcing protocol, we first apply a secure and efficient transformation scheme at the client side to encrypt the private information of the considered NLP. Then, we use the reduced gradient method and generalized gradient method at the server side to solve the transformed large-scale NLPs under linear constraints and nonlinear constraints, respectively. We provide security analysis of the proposed protocol, and evaluate its performance via a series of experiments. The experimental results show that our protocol can efficiently solve large-scale NLPs and save much time for the client, providing a great potential for real applications.
引用
收藏
页码:484 / 498
页数:15
相关论文
共 50 条
  • [21] Efficient Privacy-preserving Outsourcing of Large-scale QR Factorization
    Luo, Changqing
    Zhang, Kaijin
    Salinas, Sergio
    Li, Pan
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 917 - 924
  • [22] Privacy-preserving public auditing for secure data storage in fog-to-cloud computing
    Tian, Hui
    Nan, Fulin
    Chang, Chin-Chen
    Huang, Yongfeng
    Lu, Jing
    Du, Yongqian
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 127 : 59 - 69
  • [23] Efficient Privacy-Preserving Large-scale CP Tensor Decompositions
    Luo, Changqing
    Salinas, Sergio
    Li, Pan
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [24] Toward Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing
    Li, Yiran
    Li, Hongwei
    Xu, Guowen
    Xiang, Tao
    Huang, Xiaoming
    Lu, Rongxing
    Li, Hongwei, 1600, Institute of Electrical and Electronics Engineers Inc. (07): : 11460 - 11472
  • [25] Toward Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing
    Li, Yiran
    Li, Hongwei
    Xu, Guowen
    Xiang, Tao
    Huang, Xiaoming
    Lu, Rongxing
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (12): : 11460 - 11472
  • [26] Secure and Privacy-preserving Task Announcement in Vehicular Cloud
    Alamer, Abdulrahman
    Deng, Yong
    Lin, Xiaodong
    2017 9TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2017,
  • [27] Privacy-Preserving Public Auditing for Secure Cloud Storage
    Wang, Cong
    Chow, Sherman S. M.
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (02) : 362 - 375
  • [28] Secure and privacy-preserving pattern matching in outsourced computing
    Li, Dongmei
    Dong, Xiaolei
    Cao, Zhenfu
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3444 - 3451
  • [29] Efficient Privacy-Preserving Biometric Identification in Cloud Computing
    Yuan, Jiawei
    Yu, Shucheng
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2652 - 2660
  • [30] A secure privacy preserving deduplication scheme for cloud computing
    Fan, Yongkai
    Lin, Xiaodong
    Liang, Wei
    Tan, Gang
    Nanda, Priyadarsi
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 127 - 135