Privacy-Preserving and Secure Cloud Computing: A Case of Large-Scale Nonlinear Programming

被引:2
|
作者
Du, Wei [1 ]
Li, Ang [2 ]
Li, Qinghua [1 ]
Zhou, Pan [3 ]
机构
[1] Univ Arkansas, Dept Comp Sci & Comp Engn, Fayetteville, AR 72701 USA
[2] Duke Univ, Dept Elect & Comp Engn, Durham, NC 27708 USA
[3] Huazhong Univ Sci & Technol, Sch Elect Informat & Commun, Wuhan 430074, Peoples R China
关键词
Cloud computing; Servers; Privacy; Outsourcing; Protocols; Gradient methods; Task analysis; privacy; security; nonlinear programming; SUPPORT VECTOR MACHINE; LARGE MATRIX; COMPUTATION; CHALLENGES; EFFICIENT;
D O I
10.1109/TCC.2021.3099720
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The volume of data is increasing rapidly, which poses a great challenge for resource-constrained users to process and analyze. A promising approach for solving computation-intensive tasks over big data is to outsource them to the cloud to take advantage of the cloud's powerful computing capability. However, it also brings privacy and security issues since the data uploaded to the cloud may contain sensitive and private information which should be protected. In this article, we address this problem and focus on the privacy-preserving and secure outsourcing of large-scale nonlinear programming problems (NLPs) subject to both linear constraints and nonlinear constraints. Large-scale NLPs play an important role in the field of data analytics but have not received enough attention in the context of cloud computing. In our outsourcing protocol, we first apply a secure and efficient transformation scheme at the client side to encrypt the private information of the considered NLP. Then, we use the reduced gradient method and generalized gradient method at the server side to solve the transformed large-scale NLPs under linear constraints and nonlinear constraints, respectively. We provide security analysis of the proposed protocol, and evaluate its performance via a series of experiments. The experimental results show that our protocol can efficiently solve large-scale NLPs and save much time for the client, providing a great potential for real applications.
引用
收藏
页码:484 / 498
页数:15
相关论文
共 50 条
  • [42] A secure privacy-preserving cloud auditing scheme with data deduplication
    Li, Chen
    Liu, Zhenhua
    International Journal of Network Security, 2019, 21 (02) : 199 - 210
  • [43] Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage
    Liu, Jia-Nan
    Luo, Xizhao
    Weng, Jian
    Yang, Anjia
    Wang, Xu An
    Li, Ming
    Lin, Xiaodong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1518 - 1531
  • [44] Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization
    Fu, Anmin
    Chen, Zhenzhu
    Mu, Yi
    Susilo, Willy
    Sun, Yinxia
    Wu, Jie
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) : 266 - 278
  • [45] Secure and Privacy-Preserving Consensus
    Ruan, Minghao
    Gao, Huan
    Wang, Yongqiang
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2019, 64 (10) : 4035 - 4049
  • [46] An Improved Privacy-Preserving Biometric Identification Scheme in Cloud Computing
    Huang, Kai
    Xu, Ming
    Fu, Shaojing
    Luo, Yuchuan
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (10) : 1891 - 1894
  • [47] A Privacy-preserving and Truthful Tendering Framework for Vehicle Cloud Computing
    Alamer, Abdulrahman
    Deng, Yong
    Lin, Xiaodong
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [48] QSDB: An Encrypted Database Model for Privacy-Preserving in Cloud Computing
    Liu, Guoxiu
    Yang, Geng
    Wang, Haiwei
    Dai, Hua
    Zhou, Qiang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (07): : 3375 - 3400
  • [49] POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing
    Hahn, Changhee
    Hur, Junbeom
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1826 - 1828
  • [50] Privacy-preserving query over the encrypted image in cloud computing
    Zhu, Xudong
    Li, Hui
    Guo, Zhen
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2014, 41 (02): : 151 - 158