Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud

被引:0
|
作者
Song, Mingyang [1 ]
Sang, Yingpeng [1 ]
机构
[1] Sun Yat Sen Univ, Sch Comp Sci & Engn, Guangzhou 510006, Peoples R China
关键词
matrix determinant; secure outsourcing; cloud computing; FULLY-HOMOMORPHIC-ENCRYPTION; MULTIPLICATION; ALGORITHMS;
D O I
10.3390/s21206821
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Computing the determinant of large matrix is a time-consuming task, which is appearing more and more widely in science and engineering problems in the era of big data. Fortunately, cloud computing can provide large storage and computation resources, and thus, act as an ideal platform to complete computation outsourced from resource-constrained devices. However, cloud computing also causes security issues. For example, the curious cloud may spy on user privacy through outsourced data. The malicious cloud violating computing scripts, as well as cloud hardware failure, will lead to incorrect results. Therefore, we propose a secure outsourcing algorithm to compute the determinant of large matrix under the malicious cloud mode in this paper. The algorithm protects the privacy of the original matrix by applying row/column permutation and other transformations to the matrix. To resist malicious cheating on the computation tasks, a new verification method is utilized in our algorithm. Unlike previous algorithms that require multiple rounds of verification, our verification requires only one round without trading off the cheating detectability, which greatly reduces the local computation burden. Both theoretical and experimental analysis demonstrate that our algorithm achieves a better efficiency on local users than previous ones on various dimensions of matrices, without sacrificing the security requirements in terms of privacy protection and cheating detectability.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] Feasibility and Infeasibility of Secure Computation with Malicious PUFs
    Dana Dachman-Soled
    Nils Fleischhacker
    Jonathan Katz
    Anna Lysyanskaya
    Dominique Schröder
    Journal of Cryptology, 2020, 33 : 595 - 617
  • [32] Outsourcing scheme of ABE encryption secure against malicious adversary
    Ohtake, Go
    Safavi-Naini, Reihaneh
    Zhang, Liang Feng
    COMPUTERS & SECURITY, 2019, 86 : 437 - 452
  • [33] Outsourcing Scheme of ABE Encryption Secure against Malicious Adversary
    Ohtake, Go
    Safavi-Naini, Reihaneh
    Zhang, Liang Feng
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 71 - 82
  • [34] Secure Outsourcing of Matrix Operations as a Service
    Nassar, Mohamad
    Erradi, Abdelkarim
    Sabri, Farida
    Malluhi, Qutaibah M.
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 918 - 925
  • [35] Secure Multi-Party Computation of Graphs' Intersection and Union under the Malicious Model
    Liu, Xin
    Tu, Xiao-Fen
    Luo, Dan
    Xu, Gang
    Xiong, Neal N.
    Chen, Xiu-Bo
    ELECTRONICS, 2023, 12 (02)
  • [36] Data confidentiality and integrity preserving outsourcing algorithm for matrix chain multiplication over malicious cloud server
    Kumar, Malay
    Vardhan, Manu
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 34 (03) : 1251 - 1263
  • [37] Malicious Computation Prevention Protocol for Secure Multi-Party Computation
    Mishra, Durgesh Kumar
    Koria, Neha
    Kapoor, Nikhil
    Bahety, Ravish
    TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 490 - +
  • [38] Secure KNN Computation on Cloud
    Sanyashi, Tikaram
    Boran, Nirmal Kumar
    Singh, Virendra
    INFORMATION SYSTEMS SECURITY, ICISS 2023, 2023, 14424 : 197 - 216
  • [39] A Fast and Secure Scheme for Data Outsourcing in the Cloud
    Liu, Yanjun
    Wu, Hsiao-Ling
    Chang, Chin-Chen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (08): : 2708 - 2721
  • [40] Practical and Secure Outsourcing of Linear Algebra in the Cloud
    Zhang, Juan
    Zhu, Yanqin
    Jin, Fangyuan
    2013 INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2013, : 81 - 87