Efficient secure outsourcing of large-scale linear systems of equations

Solving large-scale linear systems of equations (LSEs) is one of the most common and fundamental problems in big data. But such problems are often too expensive to solve for resource-limited users. Cloud computing has been proposed as a timely, efficient, and cost-effective way of solving such computing tasks. Nevertheless, one critical concern in cloud computing is data privacy. To be more prominent, in many cases, clients's LSEs contain private data that should remain hidden from the cloud for ethical, legal, or security reasons. Many previous works on secure outsourcing of LSEs have high computational complexity. More importantly, they share a common serious problem, i.e., a huge number of external memory I/O operations. This problem has been largely neglected in the past, but in fact is of particular importance and may eventually render those outsourcing schemes impractical. In this paper, we develop an efficient and practical secure outsourcing algorithm for solving large-scale LSEs, which has both low computational complexity and low memory I/O complexity and can protect clients' privacy well. We implement our algorithm on a real-world cloud server and a laptop. We find that the proposed algorithm offers significant time savings for the client (up to 65%) compared to previous algorithms.

[1]  Cong Wang,et al.  Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud , 2013, IEEE Transactions on Emerging Topics in Computing.

[2]  Tingwen Huang,et al.  Outsourcing Large Matrix Inversion Computation to A Public Cloud , 2013, IEEE Transactions on Cloud Computing.

[3]  Christos Faloutsos,et al.  Pegasus: Mining billion-scale graphs in the cloud , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[4]  Henry Stark,et al.  Probability, Statistics, and Random Processes for Engineers , 2011 .

[5]  Farrokh Albuyeh,et al.  Grid of the future , 2009, IEEE Power and Energy Magazine.

[6]  Eugene H. Spafford,et al.  Secure outsourcing of scientific computations , 2001, Adv. Comput..

[7]  Daniel M. Batista,et al.  A Survey of Large Scale Data Management Approaches in Cloud Environments , 2011, IEEE Communications Surveys & Tutorials.

[8]  Takuji Nishimura,et al.  Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator , 1998, TOMC.

[9]  Edmund Kohlwey,et al.  Leveraging the Cloud for Big Data Biometrics: Meeting the Performance Requirements of the Next Generation Biometric Systems , 2011, 2011 IEEE World Congress on Services.

[10]  Rowland R Kao,et al.  Supersize me: how whole-genome sequencing and big data are transforming epidemiology , 2014, Trends in Microbiology.

[11]  G. Nolan,et al.  Computational solutions to large-scale data management and analysis , 2010, Nature Reviews Genetics.

[12]  Tim Kraska,et al.  Finding the Needle in the Big Data Systems Haystack , 2013, IEEE Internet Computing.

[13]  Yogesh L. Simmhan,et al.  Cloud-Based Software Platform for Big Data Analytics in Smart Grids , 2013, Computing in Science & Engineering.

[14]  Cong Wang,et al.  Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations , 2013, IEEE Transactions on Parallel and Distributed Systems.

[15]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[16]  Tao Xiang,et al.  Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud , 2014, J. Parallel Distributed Comput..

[17]  2015 IEEE Conference on Computer Communications, INFOCOM 2015, Kowloon, Hong Kong, April 26 - May 1, 2015 , 2015, IEEE Conference on Computer Communications.

[18]  Stephen J. Wright,et al.  Numerical Optimization , 2018, Fundamental Statistical Inference.

[19]  Craig Gentry,et al.  Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.

[20]  Gene H. Golub,et al.  Matrix computations , 1983 .

[21]  Cong Wang,et al.  Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.

[22]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[23]  Der-Jiunn Deng,et al.  Live Data Mining Concerning Social Networking Forensics Based on a Facebook Session Through Aggregation of Social Data , 2011, IEEE Journal on Selected Areas in Communications.

[24]  Dursun Delen,et al.  Leveraging the capabilities of service-oriented decision support systems: Putting analytics and big data in cloud , 2013, Decis. Support Syst..