SecFact: Secure Large-scale QR and LU Factorizations

被引:36
|
作者
Luo, Changqing [1 ]
Zhang, Kaijin [1 ]
Salinas, Sergio [2 ]
Li, Pan [1 ]
机构
[1] Case Western Reserve Univ, Dept Elect Engn & Comp Sci, Cleveland, OH 44106 USA
[2] Wichita State Univ, Dept Elect Engn & Comp Sci, Wichita, KS 67260 USA
基金
美国国家科学基金会;
关键词
Big data; QR factorization; LU factorization; secure outsourcing; BIG DATA; ALGORITHM; SYSTEMS;
D O I
10.1109/TBDATA.2017.2782809
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We are now in the big data era. Due to the emerging various systems and applications, such as the Internet of Things, cyber-physical systems, smart cities, smart healthcare, we are able to collect more data than ever before. On the other hand, it makes it very difficult to analyze such massive data in order to advance our science and engineering fields. We note that QR and LU factorizations are two of the most fundamental mathematical tools for data analysis. However, conducting QR or LU factorization of an m x n matrix requires computational complexity of O(m(2)n). This incurs a formidable challenge in efficiently analyzing large-scale data sets by normal users or small companies on traditional resource-limited computers. To overcome this limitation, industry and academia propose to employ cloud computing that can offer abundant computing resources. This, however, obviously raises security concerns and hence a lot of users are reluctant to reveal their data to the cloud. To this end, we propose two secure outsourcing algorithms for efficiently performing large-scale QR and LU factorizations, respectively. We implement the proposed algorithms on the Amazon Elastic Compute Cloud (EC2) platform and a laptop. The experiment results show significant time saving for the user.
引用
收藏
页码:796 / 807
页数:12
相关论文
共 50 条
  • [21] Efficient Secure Outstanding of Large-scale Quadratic Programs
    Salinas, Sergio
    Luo, Changqing
    Liao, Weixian
    Li, Pan
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 281 - 292
  • [22] Distributed servers approach for large-scale secure multicast
    Chan, KC
    Chan, SHG
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2002, 20 (08) : 1500 - 1510
  • [23] Large-Scale Secure XGB for Vertical Federated Learning
    Fang, Wenjing
    Zhao, Derun
    Tan, Jin
    Chen, Chaochao
    Yu, Chaofan
    Wang, Li
    Wang, Lei
    Zhou, Jun
    Zhang, Benyu
    PROCEEDINGS OF THE 30TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT, CIKM 2021, 2021, : 443 - 452
  • [24] Secure Node Packing of Large-Scale Wireless Networks
    Lee, Jemin
    Shin, Hyundong
    Win, Moe Z.
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [25] A Secure Addressing Scheme for Large-Scale Managed MANETs
    Ghosh, Uttam
    Datta, Raja
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2015, 12 (03): : 483 - 495
  • [26] Scalable and Secure Routing for Large-Scale Sensor Networks
    Tang, Feilong
    Guo, Minyi
    Li, Minglu
    Wang, Zhijun
    Cheng, Zixue
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 300 - +
  • [27] VECTORIZED LU DECOMPOSITION ALGORITHMS FOR LARGE-SCALE CIRCUIT SIMULATION
    YAMAMOTO, F
    TAKAHASHI, S
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 1985, 4 (03) : 232 - 239
  • [28] Private and Secure Tag Access for Large-Scale RFID Systems
    Sun, Min-Te
    Sakai, Kazuya
    Ku, Wei-Shinn
    Lai, Ten H.
    Vasilakos, Athanasios V.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (06) : 657 - 671
  • [29] A secure large-scale instant payment system based on blockchain
    Zhong, Lin
    Wu, Qianhong
    Xie, Jan
    Guan, Zhenyu
    Qin, Bo
    COMPUTERS & SECURITY, 2019, 84 : 349 - 364
  • [30] A Tutorial on Secure Outsourcing of Large-scale Computations for Big Data
    Salinas, Sergio
    Chen, Xuhui
    Ji, Jinlong
    Li, Pan
    IEEE ACCESS, 2016, 4 : 1406 - 1416