Privacy-Preserving and Secure Cloud Computing: A Case of Large-Scale Nonlinear Programming

被引:2
|
作者
Du, Wei [1 ]
Li, Ang [2 ]
Li, Qinghua [1 ]
Zhou, Pan [3 ]
机构
[1] Univ Arkansas, Dept Comp Sci & Comp Engn, Fayetteville, AR 72701 USA
[2] Duke Univ, Dept Elect & Comp Engn, Durham, NC 27708 USA
[3] Huazhong Univ Sci & Technol, Sch Elect Informat & Commun, Wuhan 430074, Peoples R China
关键词
Cloud computing; Servers; Privacy; Outsourcing; Protocols; Gradient methods; Task analysis; privacy; security; nonlinear programming; SUPPORT VECTOR MACHINE; LARGE MATRIX; COMPUTATION; CHALLENGES; EFFICIENT;
D O I
10.1109/TCC.2021.3099720
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The volume of data is increasing rapidly, which poses a great challenge for resource-constrained users to process and analyze. A promising approach for solving computation-intensive tasks over big data is to outsource them to the cloud to take advantage of the cloud's powerful computing capability. However, it also brings privacy and security issues since the data uploaded to the cloud may contain sensitive and private information which should be protected. In this article, we address this problem and focus on the privacy-preserving and secure outsourcing of large-scale nonlinear programming problems (NLPs) subject to both linear constraints and nonlinear constraints. Large-scale NLPs play an important role in the field of data analytics but have not received enough attention in the context of cloud computing. In our outsourcing protocol, we first apply a secure and efficient transformation scheme at the client side to encrypt the private information of the considered NLP. Then, we use the reduced gradient method and generalized gradient method at the server side to solve the transformed large-scale NLPs under linear constraints and nonlinear constraints, respectively. We provide security analysis of the proposed protocol, and evaluate its performance via a series of experiments. The experimental results show that our protocol can efficiently solve large-scale NLPs and save much time for the client, providing a great potential for real applications.
引用
收藏
页码:484 / 498
页数:15
相关论文
共 50 条
  • [31] A Proposal of Privacy-Preserving Data Aggregation on the Cloud Computing
    Ushida, Mebae
    Itoh, Kouichi
    Katayama, Yoshinori
    Kozakura, Fumihiko
    Tsuda, Hiroshi
    2013 16TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2013), 2013, : 141 - 148
  • [32] Privacy-preserving logistic regression outsourcing in cloud computing
    Zhu, Xu Dong
    Li, Hui
    Li, Feng Hua
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 144 - 150
  • [33] A survey of privacy-preserving access control in cloud computing
    Li, Hongjiao, 1600, Binary Information Press (10):
  • [34] Hierarchical infrastructure for large-scale distributed privacy-preserving data mining
    Wang, JL
    Xu, CF
    Shen, HF
    Pan, YH
    COMPUTATIONAL SCIENCE - ICCS 2005, PT 3, 2005, 3516 : 1020 - 1023
  • [35] Privacy-preserving association rule mining in large-scale distributed systems
    Schuster, A
    Wolff, R
    Gilburd, B
    2004 IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID - CCGRID 2004, 2004, : 411 - 418
  • [36] A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing
    Xia, Zhihua
    Wang, Lan
    Tang, Jian
    Xiong, Neal N.
    Weng, Jian
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (01): : 318 - 330
  • [37] Privacy-Preserving Media Sharing with Scalable Access Control and Secure Deduplication in Mobile Cloud Computing
    Huang, Qinlong
    Zhang, Zhicheng
    Yang, Yixian
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2021, 20 (05) : 1951 - 1964
  • [38] A Secure Revised Simplex Algorithm for Privacy-Preserving Linear Programming
    Vaidya, Jaideep
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 347 - 354
  • [39] Secure and Privacy-Preserving Querying of Personal Health Records in the Cloud
    Barouti, Samira
    Aljumah, Feras
    Alhadidi, Dima
    Debbabi, Mourad
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 82 - 97
  • [40] A Secure and Privacy-preserving Incentive Framework for Vehicular Cloud on the Road
    Kong, Qinglei
    Lu, Rongxing
    Zhu, Hui
    Alamer, Abdulrahman
    Lin, Xiaodong
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,