Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations

Published: 01 June 2013 Publication History

Abstract

Cloud computing economically enables customers with limited computational resources to outsource large-scale computations to the cloud. However, how to protect customers' confidential data involved in the computations then becomes a major security concern. In this paper, we present a secure outsourcing mechanism for solving large-scale systems of linear equations (LE) in cloud. Because applying traditional approaches like Gaussian elimination or LU decomposition (aka. direct method) to such large-scale LEs would be prohibitively expensive, we build the secure LE outsourcing mechanism via a completely different approach—iterative method, which is much easier to implement in practice and only demands relatively simpler matrix-vector operations. Specifically, our mechanism enables a customer to securely harness the cloud for iteratively finding successive approximations to the LE solution, while keeping both the sensitive input and output of the computation private. For robust cheating detection, we further explore the algebraic property of matrix-vector operations and propose an efficient result verification mechanism, which allows the customer to verify all answers received from previous iterative approximations in one batch with high probability. Thorough security analysis and prototype experiments on Amazon EC2 demonstrate the validity and practicality of our proposed design.

Cited By

View all
  • (2023)TEE-based General-purpose Computational Backend for Secure Delegated Data ProcessingProceedings of the ACM on Management of Data10.1145/36267571:4(1-28)Online publication date: 12-Dec-2023
  • (2023)A Secure and Efficient Framework for Outsourcing Large-scale Matrix Determinant and Linear EquationsACM Transactions on Embedded Computing Systems10.1145/361101422:5(1-22)Online publication date: 26-Sep-2023
  • (2023)Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient RealizationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.314644820:2(988-1001)Online publication date: 1-Mar-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Transactions on Parallel and Distributed Systems
IEEE Transactions on Parallel and Distributed Systems  Volume 24, Issue 6
June 2013
205 pages

Publisher

IEEE Press

Publication History

Published: 01 June 2013

Author Tags

  1. Confidential data
  2. Cryptography
  3. Equations
  4. Iterative methods
  5. Mathematical model
  6. Outsourcing
  7. Servers
  8. Vectors
  9. cloud computing
  10. computation outsourcing
  11. system of linear equations

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)TEE-based General-purpose Computational Backend for Secure Delegated Data ProcessingProceedings of the ACM on Management of Data10.1145/36267571:4(1-28)Online publication date: 12-Dec-2023
  • (2023)A Secure and Efficient Framework for Outsourcing Large-scale Matrix Determinant and Linear EquationsACM Transactions on Embedded Computing Systems10.1145/361101422:5(1-22)Online publication date: 26-Sep-2023
  • (2023)Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient RealizationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.314644820:2(988-1001)Online publication date: 1-Mar-2023
  • (2023)Privacy-Preserving Outsourcing Algorithm for Solving Large Systems of Linear EquationsSN Computer Science10.1007/s42979-023-02093-54:5Online publication date: 29-Aug-2023
  • (2021)NPMML: A Framework for Non-Interactive Privacy-Preserving Multi-Party Machine LearningIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2020.297159818:6(2969-2982)Online publication date: 1-Nov-2021
  • (2021)Building a Secure Knowledge Marketplace Over Crowdsensed Data StreamsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2019.295890118:6(2601-2616)Online publication date: 1-Nov-2021
  • (2020)A novel publicly delegable secure outsourcing algorithm for large-scale matrix multiplicationJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-17972538:5(6445-6455)Online publication date: 1-Jan-2020
  • (2020)Efficient and Privacy-Preserving Outsourcing of 2D-DCT and 2D-IDCTWireless Communications & Mobile Computing10.1155/2020/88928382020Online publication date: 1-Jan-2020
  • (2020)Secure and Efficient Outsourcing of PCA-Based Face RecognitionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2019.294787215(1683-1695)Online publication date: 1-Jan-2020
  • (2020)Sparse Matrix Masking-Based Non-Interactive Verifiable (Outsourced) Computation, RevisitedIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2018.286169917:6(1188-1206)Online publication date: 12-Nov-2020
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media