A Secure and Verifiable Outsourcing Scheme for Matrix Inverse Computation

被引:0
|
作者
Hu, Chunqiang [1 ,2 ,3 ,5 ]
Alhothaily, Abdulrahman [3 ]
Alrawais, Arwa [3 ]
Cheng, Xiuzhen [3 ]
Sturtivant, Carl [4 ]
Liu, Hang [5 ]
机构
[1] Chongqing Univ, Minist Educ, Key Lab Dependable Serv Comp Cyber Phys Soc, Chongqing, Peoples R China
[2] Chongqing Univ, Sch Software Engn, Chongqing, Peoples R China
[3] George Washington Univ, Dept Comp Sci, Washington, DC 20052 USA
[4] Univ Minnesota, Comp Sci & Engn Dept, Minneapolis, MN 55455 USA
[5] Catholic Univ Amer, Dept Elect Engn & Comp Sci, Washington, DC 20064 USA
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
Matrix inversion; cloud/fog computing; secure outsourcing; verification; data privacy; chaotic systems; DATA ACCESS-CONTROL; CLOUD STORAGE; EFFICIENT; ENCRYPTION;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Matrix inverse computation is one of the most fundamental mathematical problems in large-scale data analytics and computing. It is often too expensive to be solved in resource-constrained devices such as sensors. Outsourcing the computation task to a cloud server or a fog server is a potential approach as the server is able to perform large-scale scientific computations on behalf of resource-constrained users with special software. However, outsourcing brings in new security concerns and challenges such as data privacy violations and result invalidation. In this paper, we propose a secure and verifiable outsourcing scheme to compute the matrix inverse in a server. In our scheme, the client generates two secret key sets based on two chaotic systems, which are utilized to create two sparse matrices whose permuted versions are used for matrix encryption and decryption to protect input and output privacy. The server computes the inverse over the ciphertext matrix and returns the result to the client who can verify the validity of the inverse. We analyze the proposed scheme in terms of correctness, security, verifiability, and attack resistance, and compare its performance (computation, storage, and communication overheads) with those of the state-of-the-art. Our theoretical results and comparison study demonstrate that the proposed scheme provides a secure and efficient outsourcing mechanism for matrix inverse computation.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Libras: A Fair, Secure, Verifiable, and Scalable Outsourcing Computation Scheme Based on Blockchain
    Huo, Lijuan
    Wu, Libing
    Zhang, Zhuangzhuang
    Li, Chunshuo
    He, Debiao
    Wang, Jing
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 5725 - 5737
  • [2] A Publicly Verifiable Outsourcing Matrix Computation Scheme Based on Smart Contracts
    Wang, Hao
    Ge, Chunpeng
    Zhou, Lu
    Liu, Zhe
    Lan, Dongwan
    Lu, Xiaozhen
    Jiang, Danni
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2024, 12 (01) : 70 - 83
  • [3] Secure and Efficient Outsourcing of Large-Scale Matrix Inverse Computation
    Pan, Shiran
    Wang, Qiongxiao
    Zheng, Fangyu
    Dong, Jiankuo
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2018), 2018, 10874 : 374 - 386
  • [4] Secure and Verifiable Data Access Control Scheme With Policy Update and Computation Outsourcing for Edge Computing
    Guan, Yue
    Guo, Songtao
    Li, Pan
    Yang, Yuanyuan
    [J]. 2020 IEEE 26TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2020, : 398 - 405
  • [5] Secure and efficient publicly verifiable ridge regression outsourcing scheme
    Ruan, Ou
    Qin, Shanshan
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 703 - 709
  • [6] An Efficient and Secure Scheme of Verifiable Computation for Intel SGX
    Ding, Wenxiu
    Sun, Wei
    Yan, Zheng
    Deng, Robert H.
    Wan, Zhiguo
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 473 - 482
  • [7] Secure outsourcing of large matrix determinant computation
    Jiayang Liu
    Jingguo Bi
    Mu Li
    [J]. Frontiers of Computer Science, 2020, 14
  • [8] Verifiable Outsourcing Computation for Matrix Multiplication With Improved Efficiency and Applicability
    Zhang, Shenmin
    Li, Hongwei
    Dai, Yuanshun
    Li, Jin
    He, Miao
    Lu, Rongxing
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (06): : 5076 - 5088
  • [9] Secure outsourcing of large matrix determinant computation
    Liu, Jiayang
    Bi, Jingguo
    Li, Mu
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2020, 14 (06)
  • [10] Enabling Efficient Publicly Verifiable Outsourcing Computation for Matrix Multiplication
    Li, Hongwei
    Zhang, Shenmin
    Luan, Tom H.
    Ren, Hao
    Dai, Yuanshun
    Zhou, Liang
    [J]. 25TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC 2015), 2015, : 44 - 50