Practical and Secure Outsourcing of Linear Algebra in the Cloud

被引:1
|
作者
Zhang, Juan [1 ]
Zhu, Yanqin [1 ]
Jin, Fangyuan [1 ]
机构
[1] Soochow Univ, Sch Comp Sci & Technol, Suzhou, Peoples R China
关键词
the cloud computation; linear algebra; outsourcing; fully homomorphic encryption;
D O I
10.1109/CBD.2013.25
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing provide an economically promising paradigm of outsourcing computation. Input/ output privacy and verification are becoming the major security concern, and the efficiency of client and cloud side is becoming the main practice concern. Focusing on the existed linear algebra outsourcing schemes used fully homomorphic encryption scheme or somewhat homomorphic encryption scheme are far from practical goal. We use matrix fully homomorphic encryption scheme to construct an efficient linear algebra outsourcing scheme. The first basic property of the scheme is the protection of input/output privacy. The second basic property is the high efficiency of the client's encryption, decryption and verification algorithms and the cloud side computation.
引用
收藏
页码:81 / 87
页数:7
相关论文
共 50 条
  • [1] Secure and Practical Outsourcing of Linear Programming in Cloud Computing
    Wang, Cong
    Ren, Kui
    Wang, Jia
    2011 PROCEEDINGS IEEE INFOCOM, 2011, : 820 - 828
  • [2] Practical and Secure Outsourcing of Matrix Computations to the Cloud
    Nassar, Mohamed
    Erradi, Abdelkarim
    Malluhi, Qutaibah M.
    2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013), 2013, : 70 - 75
  • [3] A Secure and Practical Mechanism for Outsourcing ELMs in Cloud Computing
    Lin, Jiarun
    Yin, Jianping
    Cai, Zhiping
    Liu, Qiang
    Li, Kuan
    Leung, Victor C. M.
    IEEE INTELLIGENT SYSTEMS, 2013, 28 (06) : 35 - 38
  • [4] Addition of Fake Variable to Enrich Secure Linear Programming Computation Outsourcing in the Cloud
    Ahire, Pallavi
    Abraham, Jibi
    2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 477 - 482
  • [5] Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
    Wang, Cong
    Ren, Kui
    Wang, Jia
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (01) : 216 - 229
  • [6] Practical Secure Computation Outsourcing: A Survey
    Shan, Zihao
    Ren, Kui
    Blanton, Marina
    Wang, Cong
    ACM COMPUTING SURVEYS, 2018, 51 (02)
  • [7] A Database Adapter for Secure Outsourcing to the Cloud
    Dowsley, Rafael
    Gabel, Matthias
    Yurchenko, Kateryna
    Zipf, Valentin
    2016 8TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2016), 2016, : 503 - 508
  • [8] On Secure Outsourcing of Cryptographic Computations to Cloud
    Kuppusamy, Lakshmi
    Rangasamy, Jothi
    Gauravaram, Praveen
    SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 63 - 67
  • [9] A Fast and Secure Scheme for Data Outsourcing in the Cloud
    Liu, Yanjun
    Wu, Hsiao-Ling
    Chang, Chin-Chen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (08): : 2708 - 2721
  • [10] Secure and EfficientRegression Analysis Outsourcing Algorithm for Cloud Server
    Kumar, Malay
    Meena, Jasraj
    Vardhan, Manu
    Jain, Sanjeev
    INTERNATIONAL CONFERENCE ON ADVANCES IN INFORMATION COMMUNICATION TECHNOLOGY & COMPUTING, 2016, 2016,