Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud

被引:0
|
作者
Song, Mingyang [1 ]
Sang, Yingpeng [1 ]
机构
[1] Sun Yat Sen Univ, Sch Comp Sci & Engn, Guangzhou 510006, Peoples R China
关键词
matrix determinant; secure outsourcing; cloud computing; FULLY-HOMOMORPHIC-ENCRYPTION; MULTIPLICATION; ALGORITHMS;
D O I
10.3390/s21206821
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Computing the determinant of large matrix is a time-consuming task, which is appearing more and more widely in science and engineering problems in the era of big data. Fortunately, cloud computing can provide large storage and computation resources, and thus, act as an ideal platform to complete computation outsourced from resource-constrained devices. However, cloud computing also causes security issues. For example, the curious cloud may spy on user privacy through outsourced data. The malicious cloud violating computing scripts, as well as cloud hardware failure, will lead to incorrect results. Therefore, we propose a secure outsourcing algorithm to compute the determinant of large matrix under the malicious cloud mode in this paper. The algorithm protects the privacy of the original matrix by applying row/column permutation and other transformations to the matrix. To resist malicious cheating on the computation tasks, a new verification method is utilized in our algorithm. Unlike previous algorithms that require multiple rounds of verification, our verification requires only one round without trading off the cheating detectability, which greatly reduces the local computation burden. Both theoretical and experimental analysis demonstrate that our algorithm achieves a better efficiency on local users than previous ones on various dimensions of matrices, without sacrificing the security requirements in terms of privacy protection and cheating detectability.
引用
收藏
页数:20
相关论文
共 50 条
  • [41] Secure linear system computation in the presence of malicious adversaries
    ZHANG Bo
    ZHANG FangGuo
    Science China(Information Sciences), 2014, 57 (09) : 146 - 155
  • [42] Secure linear system computation in the presence of malicious adversaries
    Zhang Bo
    Zhang FangGuo
    SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (09) : 1 - 10
  • [43] Two-Output Secure Computation with Malicious Adversaries
    Shelat, Abhi
    Shen, Chih-Hao
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 386 - 405
  • [44] Secure computation of common data among malicious partners
    Obermeier, Sebastian
    Boettcher, Stefan
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 345 - 354
  • [45] Secure anonymous union computation among malicious partners
    Boettcher, Stefan
    Obermeier, Sebastian
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 128 - +
  • [46] Secure linear system computation in the presence of malicious adversaries
    Bo Zhang
    FangGuo Zhang
    Science China Information Sciences, 2014, 57 : 1 - 10
  • [47] Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation
    Zhang, Jindan
    Wang, Baocang
    Xhafa, Fatos
    Wang, Xu An
    Li, Cong
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (02) : 429 - 438
  • [48] Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation
    Jindan Zhang
    Baocang Wang
    Fatos Xhafa
    Xu An Wang
    Cong Li
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 429 - 438
  • [49] Outsourcing computation of modular exponentiations in cloud computing
    Ma, Xu
    Li, Jin
    Zhang, Fangguo
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 787 - 796
  • [50] Outsourcing computation of modular exponentiations in cloud computing
    Xu Ma
    Jin Li
    Fangguo Zhang
    Cluster Computing, 2013, 16 : 787 - 796