Efficiently and securely harnessing cloud to solve linear regression and other matrix operations

Abstract In this paper, we study the problem of efficiently outsourcing large-scale linear regression of a customer to the public cloud while preserving the privacy of the customer’s input and output results. To reduce the customer’s computation costs, existing schemes generally use diagonal matrix multiplication to encrypt the input data. While such approaches are efficient, there are potential security limitations. For example, in this paper we reveal previously unknown limitations in the scheme of Chen et al. (2014). We then present a novel method to generate random dense matrices, and a new secure solution for outsourcing linear regression to cloud. In our proposed approach, we perturb the customer’s input/output by adding random numbers and multiplying our constructed random dense matrices. A comparative summary demonstrates that the proposed approach has a stronger level of security, without incurring additional computation complexity. We also demonstrate that our constructed dense matrices can be utilized to efficiently enhance the security of outsourcing scheme for other large-scale matrix operations, including linear equation system and determinant computation.

[1]  R. Raz,et al.  How to delegate computations: the power of no-signaling proofs , 2014, Electron. Colloquium Comput. Complex..

[2]  Jian Wang,et al.  On efficiently harnessing cloud to securely solve linear regression and other matrix operations , 2016, 2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS).

[3]  Craig Gentry,et al.  Pinocchio: Nearly Practical Verifiable Computation , 2013, IEEE Symposium on Security and Privacy.

[4]  Aniello Castiglione,et al.  Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner , 2017, Comput. Secur..

[5]  Vinod Vaikuntanathan,et al.  How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption , 2012, IACR Cryptol. ePrint Arch..

[6]  Fida Kamal Dankar,et al.  Privacy Preserving Linear Regression on Distributed Databases , 2015, Trans. Data Priv..

[7]  Vinod Vaikuntanathan,et al.  Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[8]  Joseph K. Liu,et al.  A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing , 2014, IEEE Transactions on Information Forensics and Security.

[9]  Craig Gentry,et al.  Fully Homomorphic Encryption with Polylog Overhead , 2012, EUROCRYPT.

[10]  Tao Xiang,et al.  Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud , 2014, J. Parallel Distributed Comput..

[11]  Jian Wang,et al.  Efficient Encrypted Data Comparison Through a Hybrid Method , 2017, J. Inf. Sci. Eng..

[12]  Geong Sen Poh,et al.  Searchable Symmetric Encryption , 2017, ACM Comput. Surv..

[13]  Mikhail J. Atallah,et al.  Securely outsourcing linear algebra computations , 2010, ASIACCS '10.

[14]  Yael Tauman Kalai,et al.  Improved Delegation of Computation using Fully Homomorphic Encryption , 2010, IACR Cryptol. ePrint Arch..

[15]  Han Liu,et al.  Challenges of Big Data Analysis. , 2013, National science review.

[16]  Bingru Yang,et al.  Privacy preserving linear regression modeling of distributed databases , 2013, Optim. Lett..

[17]  Craig Gentry,et al.  Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.

[18]  Martine De Cock,et al.  Fast, Privacy Preserving Linear Regression over Distributed Datasets based on Pre-Distributed Data , 2015, AISec@CCS.

[19]  Tao Xiang,et al.  Highly Efficient Linear Regression Outsourcing to a Cloud , 2014, IEEE Transactions on Cloud Computing.

[20]  Manuel Barbosa,et al.  Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation , 2012, CT-RSA.

[21]  Tsuyoshi Takagi,et al.  Secure and controllable k-NN query over encrypted cloud data with key confidentiality , 2016, J. Parallel Distributed Comput..

[22]  Lei Zhang,et al.  Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud , 2016, IEEE Transactions on Information Forensics and Security.

[23]  S. Fienberg,et al.  Secure multiple linear regression based on homomorphic encryption , 2011 .

[24]  Vinod Vaikuntanathan,et al.  Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[25]  Jin Li,et al.  New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations , 2015, IEEE Transactions on Information Forensics and Security.

[26]  Tingwen Huang,et al.  Outsourcing Large Matrix Inversion Computation to A Public Cloud , 2013, IEEE Transactions on Cloud Computing.

[27]  Cong Wang,et al.  Proof-Carrying Cloud Computation: The Case of Convex Optimization , 2014 .

[28]  Cong Wang,et al.  Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.

[29]  Joseph K. Liu,et al.  Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services , 2016, IEEE Transactions on Information Forensics and Security.

[30]  Tingwen Huang,et al.  Cloud Computing Service: The Caseof Large Matrix Determinant Computation , 2015, IEEE Transactions on Services Computing.

[31]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[32]  Tingwen Huang,et al.  Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud , 2014, Inf. Sci..

[33]  Mingwu Zhang,et al.  On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification , 2018, IEEE Transactions on Dependable and Secure Computing.