skip to main content
research-article

A Secure and Efficient Framework for Outsourcing Large-scale Matrix Determinant and Linear Equations

Authors Info & Claims
Published:26 September 2023Publication History
Skip Abstract Section

Abstract

Large-scale matrix determinants and linear equations are two basic computational tools in science and engineering fields. However, it is difficult for a resource-constrained client to solve large-scale computational tasks. Cloud computing service provides additional computing resources for resource-constrained clients. To solve the problem of large-scale computation, in this article, a secure and efficient framework is proposed to outsource large-scale matrix determinants and linear equations to a cloud. Specifically, the proposed framework contains two protocols, which solve large-scale matrix determinant and linear equations, respectively. In the outsourcing protocols of large-scale matrix determinants and linear equations, the task matrix is encrypted and sent to the cloud by the client. The encrypted task matrix is directly computed by using LU factorization in the cloud. The computed result is returned and verified by the cloud and the client, respectively. The computed result is decrypted if it passes the verification. Otherwise, it is returned to the cloud for recalculation. The framework can protect the input privacy and output privacy of the client. The framework also can guarantee the correctness of the result and reduce the local computational complexity. Furthermore, the experimental results show that the framework can save more than 70% of computing resources after outsourcing computing. Thus, this article provides a secure and efficient alternative for solving large-scale computational tasks.

REFERENCES

  1. [1] Buyya Rajkumar. 2010. Cloud computing: The next revolution in information technology. In 1st International Conference on Parallel, Distributed and Grid Computing (PDGC’10). 23.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] Chen Fei, Xiang Tao, Lei Xinyu, and Chen Jianyong. 2014. Highly efficient linear regression outsourcing to a cloud. IEEE Trans. Cloud Comput. 2, 4 (2014), 499508.Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] Chen Fei, Xiang Tao, and Yang Yuanyuan. 2014. Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud. J. Parallel Distrib. Comput. 74, 3 (2014), 21412151.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Chen Xiaofeng, Huang Xinyi, Li Jin, Ma Jianfeng, Lou Wenjing, and Wong Duncan S.. 2015. New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans. Inf. Forens. Secur. 10, 1 (2015), 6978.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Ding Qi, Weng Guobiao, Zhao Guohui, and Hu Changhui. 2018. Efficient and secure outsourcing of large-scale linear system of equations. IEEE Trans. Cloud Comput. 9, 2 (2018), 587597.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Feng Da, Zhou Fucai, He Debiao, Guo Mengna, and Wu Qiyu. 2022. Secure distributed outsourcing of large-scale linear systems. Proc. Int. Conf. Distrib. Comput. Syst. 1, 1 (2022), 11101121.Google ScholarGoogle Scholar
  7. [7] Fu Anmin, Chen Zhenzhu, Mu Yi, Susilo Willy, Sun Yinxia, and Wu Jie. 2019. Cloud-based outsourcing for enabling privacy-preserving large-scale non-negative matrix factorization. IEEE Trans. Serv. Comput. 15, 1 (2019), 113.Google ScholarGoogle Scholar
  8. [8] Fu Shaojing, Yu Yunpeng, and Xu Ming. 2017. Practical privacy-preserving outsourcing of large-scale matrix determinant computation in the cloud. In Cloud Computing and Security Conference. 315.Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Jiang Mingfang and Yang Hengfu. 2020. Secure outsourcing algorithm of BTC feature extraction in cloud computing. IEEE Access 8, 1 (2020), 106958106967.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Lei Xinyu, Liao Xiaofeng, Huang Tingwen, and Heriniaina Feno. 2014. Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud. Inf. Sci. 280, 1 (2014), 205217.Google ScholarGoogle ScholarCross RefCross Ref
  11. [11] Lei Xinyu, Liao Xiaofeng, Huang Tingwen, and Li Huaqing. 2015. Cloud computing service: The case of large matrix determinant computation. IEEE Trans. Serv. Comput. 8, 5 (2015), 688700.Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Lei Xinyu, Liao Xiaofeng, Huang Tingwen, Li Huaqing, and Hu Chunqiang. 2013. Outsourcing large matrix inversion computation to a public Cloud. IEEE Trans. Cloud Comput. 1, 1 (2013), 7887.Google ScholarGoogle Scholar
  13. [13] Li Dongmei, Dong Xiaolei, Cao Zhenfu, and Wang Haijiang. 2018. Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation. Sci. China Inf. Sci. 61, 3 (2018), 19.Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Lindell Yehida. 2011. Secure multiparty computation for privacy preserving data mining. Encyc. Data Warehous. Mining 1, 1 (2011), 139.Google ScholarGoogle Scholar
  15. [15] Liu Jiayang, Bi Jingguo, and Li Mu. 2020. Secure outsourcing of large matrix determinant computation. Front. Comput. Sci. 14, 6 (2020), 146807146819.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Nie Haixin, Chen Xiaofeng, Li Jin, Liu Josolph, and Lou Wenjing. 2014. Efficient and verifiable algorithm for secure outsourcing of large-scale linear programming. In Proceedings of the International Conference on Advanced Information Networking and Applications (AINA’14). 591596.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Ren Kui, Wang Cong, and Wang Qian. 2012. Security challenges for the public cloud. IEEE Internet Comput. 16, 1 (2012), 6973.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Ren Yanli, Song Zhuhuan, Sun Shifeng, Liu Joseph, and Feng Guorui. 2022. Outsourcing LDA-based face recognition to an untrusted cloud. IEEE Trans. Depend. Sec. Comput. 1, 1 (2022), 112.Google ScholarGoogle Scholar
  19. [19] Salinas Sergio, Luo Changqing, Chen Xuhui, and Li Pan. 2015. Efficient secure outsourcing of large-scale linear systems of equations. In Proceedings of the IEEE INFOCOM Conference. 10351043.Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Shan Zihao, Ren Kui, Blanton Marina, and Wang Cong. 2019. Practical secure computation outsourcing. Comput. Surv. 51, 2 (2019), 140.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Simmhan Yogesh, Aman Saima, Kumbhare Alok, Liu Rongyang, Stevens Sam, Zhou Qunzhi, and Prasanna Viktor. 2013. Cloud-based software platform for big data analytics in smart grids. Comput. Sci. Eng. 15, 4 (2013), 3847.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Song Mingyang and Sang Yingpeng. 2021. Secure outsourcing of matrix determinant computation under the malicious cloud. Sensors 21, 20 (2021), 120.Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Wang Cong, Ren Kui, and Wang Jia. 2011. Secure and practical outsourcing of linear programming in cloud computing. In Proceedings of the IEEE INFOCOM Conference. 820828.Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Wang Cong, Ren Kui, and Wang Jia. 2016. Secure optimization computation outsourcing in cloud computing: a case study of linear programming. IEEE Trans. Comput. 65, 1 (2016), 216229.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Wang Cong, Ren Kui, Wang Jia, and Wang Qian. 2013. Harnessing the cloud for securely outsourcing large-scale systems of linear equations. IEEE Trans. Parallel Distrib. Syst. 24, 6 (2013), 11721181.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] Wang Cong, Zhang Bingsheng, Ren Kui, and Roveda Janet M.. 2013. Privacy-assured outsourcing of image reconstruction service in cloud. IEEE Trans. Emerg. Topics Comput. 1, 1 (2013), 166177.Google ScholarGoogle ScholarCross RefCross Ref
  27. [27] Wang Liwei, Zhang Yan, and Feng Jufu. 2005. On the Euclidean distance of images. IEEE Trans. Pattern Anal. Mach. Intell. 27, 8 (2005), 13341339.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. [28] Xiao Xiangli, Huang Junjian, Zhang Yushu, and He Xing. 2019. Efficient and secure outsourcing of DFT, IDFT, and circular convolution. IEEE Access 7, 1 (2019), 6012660133.Google ScholarGoogle ScholarCross RefCross Ref
  29. [29] Yang Yang, Xiong Ping, Huang Qing, and Chen Fei. 2020. Secure and efficient outsourcing computation on large-scale linear regressions. Inf. Sci. 522, 1 (2020), 134147.Google ScholarGoogle ScholarCross RefCross Ref
  30. [30] Zhang Hanlin, Gao Peng, Yu Jia, Lin Jie, and Xiong Neal N.. 2022. Machine learning on cloud with blockchain: A secure, verifiable and fair approach to outsource the linear regression. IEEE Trans. Netw. Sci. Eng. 9, 6 (2022), 39563967.Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] Zhang Yushu, He Qi, Chen Guo, Zhang Xinpeng, and Xiang Yong. 2019. A low-overhead, confidentiality-assured, and authenticated data acquisition framework for IoT. IEEE Trans. Industr. Inform. 16, 12 (2019), 75667578.Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] Zhang Yushu, Huang Hui, Xiang Yong, Zhang Leo Yu, and He Xing. 2017. Harnessing the hybrid cloud for secure big image data service. IEEE Internet Things J. 4, 5 (2017), 13801388.Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] Zhang Yushu, Jiang Jin, Xiang Yong, Zhu Ye, Wan Liangtian, and Xie Xiyuan. 2020. Cloud-assisted privacy-conscious large-scale Markowitz portfolio. Inf. Sci. 527, 1 (2020), 548559.Google ScholarGoogle ScholarCross RefCross Ref
  34. [34] Zhang Yushu, Wang Ping, Fang Liming, He Xing, Han Hao, and Chen Bing. 2020. Secure transmission of compressed sampling data using edge clouds. IEEE Trans. Industr. Inform. 16, 10 (2020), 66416651.Google ScholarGoogle ScholarCross RefCross Ref
  35. [35] Zhang Yushu, Wang Ping, Huang Hui, Zhu Youwen, Xiao Di, and Xiang Yong. 2020. Privacy-assured FogCS: Chaotic compressive sensing for secure industrial big image data processing in fog computing. IEEE Trans. Industr. Inform. 3203, 4 (2020), 111.Google ScholarGoogle Scholar
  36. [36] Zhang Yushu, Xiang Yong, Zhang Leo Yu, Yang Lu-Xing, and Zhou Jiantao. 2019. Efficiently and securely outsourcing compressed sensing reconstruction to a cloud. Inf. Sci. 496, 1 (2019), 150160.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. [37] Zhang Yushu, Xiao Xiangli, Yang Lu-Xing, Xiang Yong, and Zhong Sheng. 2020. Secure and efficient outsourcing of PCA-based face recognition. IEEE Trans. Inf. Forens. Secur. 15, 4 (2020), 16831695.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. [38] Zhao Pu, Yu Jia, Zhang Hanlin, Qin Zhan, and Wang Cong. 2020. How to securely outsource finding the min-cut of undirected edge-weighted graphs. IEEE Trans. Inf. Forens. Secur. 15, 1 (2020), 315328.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. [39] Zhou Lifeng and Li Chunguang. 2015. Outsourcing large-scale quadratic programming to a public cloud. IEEE Access 3, 1 (2015), 25812589.Google ScholarGoogle ScholarCross RefCross Ref
  40. [40] Zhou Lifeng and Li Chunguang. 2016. Outsourcing eigen-decomposition and singular value decomposition of large matrix to a public cloud. IEEE Access 4, 1 (2016), 869879.Google ScholarGoogle ScholarCross RefCross Ref
  41. [41] Zhou Lu, Zhu Youwen, and Choo Kim Kwang Raymond. 2018. Efficiently and securely harnessing cloud to solve linear regression and other matrix operations. Fut. Gen. Comput. Syst. 81, 1 (2018), 404413.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Secure and Efficient Framework for Outsourcing Large-scale Matrix Determinant and Linear Equations

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Embedded Computing Systems
        ACM Transactions on Embedded Computing Systems  Volume 22, Issue 5
        September 2023
        217 pages
        ISSN:1539-9087
        EISSN:1558-3465
        DOI:10.1145/3625382
        • Editor:
        • Tulika Mitra
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 26 September 2023
        • Online AM: 26 July 2023
        • Accepted: 22 July 2023
        • Revised: 21 June 2023
        • Received: 10 October 2022
        Published in tecs Volume 22, Issue 5

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
      • Article Metrics

        • Downloads (Last 12 months)171
        • Downloads (Last 6 weeks)23

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text