Secure Outsourced Principal Eigentensor Computation for Cyber-Physical-Social Systems

Cyber-physical-social systems (CPSS) are revolutionizing the relationships between humans, computers and things. Outsourcing computation to cloud can offer resources-constrained enterprises and consumers sustainable computing in CPSS. However, ensuring the security of data in such an outsourced environment remains a research challenge. Principal eigentensor computation has emerged as a powerful tool dealing with multidimensional cyber-physical-social systems data. In this paper, we present two novel secure principal eigentensor computation (SPEC) schemes for sustainable CPSS. To the best of our knowledge, this is the first effort to address SPEC over encrypted data in cloud without the interaction need between multiple users and cloud. More specifically, we leverage cloud server and trusted hardware component to design a collaborative cloud model. Using the model, we propose (1) a basic SPEC scheme based on homomorphic computing and (2) an efficient SPEC scheme that combines the advantages of homomorphic computing and garbled circuits, and exploits packing technology to reduce computational cost. Finally, we theoretically and empirically analyze the security and efficiency of our SPEC schemes. Findings demonstrate that the proposed schemes provide a secure and efficient way of outsourcing computation for CPSS. In addition, from the cloud user's perspective, our proposal is lightweight.

[1]  Elisa Bertino,et al.  Single-Database Private Information Retrieval from Fully Homomorphic Encryption , 2013, IEEE Transactions on Knowledge and Data Engineering.

[2]  Laurence T. Yang,et al.  Parallel GNFS algorithm integrated with parallel block Wiedemann algorithm for RSA security in cloud computing , 2017, Inf. Sci..

[3]  Stratis Ioannidis,et al.  Privacy-preserving matrix factorization , 2013, CCS.

[4]  Jonathan Katz,et al.  Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.

[5]  Joseph K. Liu,et al.  Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data , 2015, ESORICS.

[6]  Keke Gai,et al.  Resource Management in Sustainable Cyber-Physical Systems Using Heterogeneous Cloud Computing , 2018, IEEE Transactions on Sustainable Computing.

[7]  Nikos D. Sidiropoulos,et al.  Tensors for Data Mining and Data Fusion , 2016, ACM Trans. Intell. Syst. Technol..

[8]  Yang Xiang,et al.  Embedded Device Forensics and Security , 2017, ACM Trans. Embed. Comput. Syst..

[9]  Yehuda Lindell Tutorials on the Foundations of Cryptography: Dedicated to Oded Goldreich , 2017 .

[10]  Francisco Javier González-Serrano,et al.  Training Support Vector Machines with privacy-protected data , 2017, Pattern Recognit..

[11]  Craig Gentry,et al.  Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.

[12]  Laurence T. Yang,et al.  A Big Data-as-a-Service Framework: State-of-the-Art and Perspectives , 2018, IEEE Transactions on Big Data.

[13]  Yehuda Lindell,et al.  A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.

[14]  Stanley B. Zdonik,et al.  Answering Aggregation Queries in a Secure System Model , 2007, VLDB.

[15]  Myeonggil Choi Leadership of Information Security Manager on the Effectiveness of Information Systems Security for Secure Sustainable Computing , 2016 .

[16]  Albert Y. Zomaya,et al.  Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing , 2018, IEEE Communications Magazine.

[17]  Ahmad-Reza Sadeghi,et al.  A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design , 2013, J. Comput. Secur..

[18]  Ting Yu,et al.  Dynamic and Efficient Private Keyword Search over Inverted Index--Based Encrypted Data , 2016, ACM Trans. Internet Techn..

[19]  Laurence T. Yang,et al.  A Tensor Computation and Optimization Model for Cyber-Physical-Social Big Data , 2019, IEEE Transactions on Sustainable Computing.

[20]  Laurence T. Yang,et al.  The Cyber-Physical-Social Transition Tensor Service Framework , 2018 .

[21]  Shafi Goldwasser,et al.  Machine Learning Classification over Encrypted Data , 2015, NDSS.

[22]  Changyu Dong,et al.  A Fast Single Server Private Information Retrieval Protocol with Low Communication Cost , 2014, ESORICS.

[23]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[24]  Qian Wang,et al.  Searchable Encryption over Feature-Rich Data , 2018, IEEE Transactions on Dependable and Secure Computing.

[25]  Mohamed Elhoseny,et al.  Secure Automated Forensic Investigation for Sustainable Critical Infrastructures Compliant with Green Computing Requirements , 2020, IEEE Transactions on Sustainable Computing.

[26]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[27]  Elisa Bertino,et al.  Private Searching on Streaming Data Based on Keyword Frequency , 2014, IEEE Transactions on Dependable and Secure Computing.

[28]  Kim-Kwang Raymond Choo,et al.  Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy? , 2018, IEEE Cloud Computing.

[29]  Wen Hu,et al.  Talos: Encrypted Query Processing for the Internet of Things , 2015, SenSys.

[30]  Ruby B. Lee,et al.  CloudMonatt: An architecture for security health monitoring and attestation of virtual machines in cloud computing , 2015, 2015 ACM/IEEE 42nd Annual International Symposium on Computer Architecture (ISCA).

[31]  Laurence T. Yang,et al.  Tensor-based Big Biometric Data Reduction in Cloud , 2018, IEEE Cloud Computing.

[32]  Shucheng Yu,et al.  Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[33]  Raphael C.-W. Phan,et al.  Facial Expression Recognition in the Encrypted Domain Based on Local Fisher Discriminant Analysis , 2013, IEEE Transactions on Affective Computing.