Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud

被引:52
|
作者
Chen, Fei [1 ]
Xiang, Tao [2 ]
Yang, Yuanyuan [3 ]
机构
[1] Chinese Univ Hong Kong, Dept Comp Sci & Engn, Hong Kong, Hong Kong, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing 630044, Peoples R China
[3] SUNY Stony Brook, Dept Elect & Comp Engn, Stony Brook, NY 11794 USA
基金
中国国家自然科学基金;
关键词
Computation outsourcing; Linear equation solving; Linear programming; Cloud computing; Distributed computing; LARGE-SCALE SYSTEMS; DELEGATION; SECURE;
D O I
10.1016/j.jpdc.2013.11.007
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Computation outsourcing to the cloud has become a popular application in the age of cloud computing. Recently, two protocols for secure outsourcing scientific computations, i.e., linear equation solving and linear programming solving, to the cloud were proposed. In this paper, we improve the work by proposing new protocols that achieve significant performance gains. For linear equation solving outsourcing, we achieve the improvement by proposing a completely new protocol. The new protocol employs some special linear transformations and there are no homomorphic encryptions and interactions between the client and the cloud, compared with the previous protocol. For linear programming outsourcing, we achieve the improvement by reformulating the linear programming problem in the standard and natural form. We also introduce a method to reduce the key size by using a pseudorandom number generator. The design of the newly proposed protocols also sheds some insight on constructing secure outsourcing protocols for other scientific computations. Comparisons between our protocols and the previous protocols are given, which demonstrate significant improvements of our proposed protocols. We also carry out numerical experiments to validate the efficiency of our protocols for secure linear equation solving and linear programming outsourcing. (C) 2013 Elsevier Inc. All rights reserved.
引用
收藏
页码:2141 / 2151
页数:11
相关论文
共 50 条
  • [1] Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation
    Schoenmakers, Berry
    Veeningen, Meilof
    de Vreede, Niels
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 346 - 366
  • [2] Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious Cloud
    Xie, Dawei
    Yang, Haining
    Qin, Jing
    Ma, Jixin
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2019, 11 (04) : 14 - 27
  • [3] Verifiable Privacy-Preserving Data Aggregation Protocols
    Yasuda, Satoshi
    Koseki, Yoshihiro
    Sakai, Yusuke
    Kitagawa, Fuyuki
    Kawai, Yutaka
    Hanaoka, Goichiro
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 183 - 194
  • [4] SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud
    Wang, Qian
    Wang, Jingjun
    Hu, Shengshan
    Zou, Qin
    Ren, Kui
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 257 - 268
  • [5] Privacy-Preserving and Verifiable Outsourcing Linear Inference Computing Framework
    Liu, Jiao
    Li, Xinghua
    Liu, Ximeng
    Tang, Jiawei
    Wang, Yunwei
    Tong, Qiuyun
    Ma, Jianfeng
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) : 4591 - 4604
  • [6] Privacy-preserving and Verifiable Outsourcing Inference Against Malicious Servers
    Liu, Yiyao
    Li, Hongwei
    Hao, Meng
    Zhang, Xilin
    Hu, Guiqiang
    [J]. IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 5001 - 5006
  • [7] Outsourcing Privacy-Preserving Social Networks to a Cloud
    Wang, Guojun
    Liu, Qin
    Li, Feng
    Yang, Shuhui
    Wu, Jie
    [J]. 2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2886 - 2894
  • [8] A Privacy-Preserving Access Control Scheme with Verifiable and Outsourcing Capabilities in Fog-Cloud Computing
    Cheng, Zhen
    Zhang, Jiale
    Qian, Hongyan
    Xiang, Mingrong
    Wu, Di
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING (ICA3PP 2019), PT I, 2020, 11944 : 345 - 358
  • [9] Practical Privacy-Preserving Outsourcing of Large-Scale Matrix Determinant Computation in the Cloud
    Fu, Shaojing
    Yu, Yunpeng
    Xu, Ming
    [J]. CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 3 - 15
  • [10] Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT
    Li, Hongjun
    Kong, Fanyu
    Yu, Jia
    Zhang, Hanlin
    Diao, Luhong
    Tao, Yunting
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 556 - 564