Data Confidentiality and Integrity Preserving Outsourcing Algorithm for System of Linear Equation to a Malicious Cloud Server

Cloud computing has become a revolution in the field of computing, which enables flexible, on-demand, usage of computing resources in pay-as-per-use model. However, data and computation go to some third-party cloud server beyond the physical control of client escalates various privacy and security concern. This paper proposes an improved outsourcing algorithm for system of linear equation (SLE). The improvements are first, the existing work uses expensive cryptographic computation such as Paillier encryption for security arrangement, the proposed solution does not use such cryptographic primitives rather uses efficient linear transformation method. Secondly, the previous work uses an iterative process, which required L rounds of communication between the client and cloud server, at the same time each iteration causes burden of a decryption followed by a matrix vector multiplication. However, the proposed solution required an optimal one round of communication and one-time transformation and retransformation service. Third, the previous work gives result verification method with (1/2l) error probability, the value of l is a trade-off between security and efficiency. However, the proposed solution gives an error checking with an optimal probability of one. Moreover, a security analysis has been performed on the previous method, which proves marginal security arrangement due to inappropriate use of the Paillier encryption scheme. The proposal has been verified through theoretical and experimental analysis, which demonstrate the superiority of the proposed algorithm as compared to the existing algorithm. Data Confidentiality and Integrity Preserving Outsourcing Algorithm for System of Linear Equation to a Malicious Cloud Server

[1]  Andrew Chi-Chih Yao,et al.  How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).

[2]  Vinod Vaikuntanathan,et al.  On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption , 2012, STOC '12.

[3]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[4]  Elaine Shi,et al.  Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems , 2005, SOSP '05.

[5]  RattenVanessa Cloud Computing Services , 2012 .

[6]  Yihua Zhang,et al.  Efficient Secure and Verifiable Outsourcing of Matrix Multiplications , 2014, ISC.

[7]  B. Snaith,et al.  Emergency ultrasound in the prehospital setting: the impact of environment on examination outcomes , 2011, Emergency Medicine Journal.

[8]  Enav Weinreb,et al.  Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries , 2008, CRYPTO.

[9]  Yael Tauman Kalai,et al.  Delegating computation: interactive proofs for muggles , 2008, STOC.

[10]  Xing Hu,et al.  Secure outsourced computation of the characteristic polynomial and eigenvalues of matrix , 2015, Journal of Cloud Computing.

[11]  Tao Xiang,et al.  Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud , 2014, J. Parallel Distributed Comput..

[12]  Yoji Yamato Automatic verification technology of software patches for user virtual environments on IaaS cloud , 2015, Journal of Cloud Computing.

[13]  Rajkumar Buyya,et al.  A Review on Distributed Application Processing Frameworks in Smart Mobile Devices for Mobile Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.

[14]  Craig Gentry,et al.  Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.

[15]  Alptekin Küpçü,et al.  Incentivizing outsourced computation , 2008, NetEcon '08.

[16]  Yael Tauman Kalai,et al.  Improved Delegation of Computation using Fully Homomorphic Encryption , 2010, IACR Cryptol. ePrint Arch..

[17]  Jaideep Vaidya,et al.  Secure and efficient distributed linear programming , 2012, J. Comput. Secur..

[18]  Jung Hee Cheon,et al.  Batch Fully Homomorphic Encryption over the Integers , 2013, EUROCRYPT.

[19]  Mikhail J. Atallah,et al.  Securely outsourcing linear algebra computations , 2010, ASIACCS '10.

[20]  Cong Wang,et al.  Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.

[21]  Silvio Micali,et al.  The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..

[22]  Ming-Syan Chen,et al.  Privacy-preserving outsourcing support vector machines with random transformation , 2010, KDD.

[23]  Carsten Lund,et al.  Interactive Proof Systems and Alternating Time-Space Complexity , 1991, Theor. Comput. Sci..

[24]  Jianfeng Ma,et al.  New Algorithms for Secure Outsourcing of Modular Exponentiations , 2014, IEEE Trans. Parallel Distributed Syst..

[25]  Yousef Saad,et al.  Parallel Iterative Methods for Sparse Linear Systems , 2001 .

[26]  Yehuda Lindell,et al.  Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..

[27]  Tingwen Huang,et al.  Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud , 2014, Inf. Sci..

[28]  Payman Mohassel,et al.  Efficient and Secure Delegation of Linear Algebra , 2011, IACR Cryptol. ePrint Arch..

[29]  Craig Gentry,et al.  Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.

[30]  Peeter Laud,et al.  Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers , 2015, IACR Cryptol. ePrint Arch..

[31]  Silvio Micali,et al.  A Completeness Theorem for Protocols with Honest Majority , 1987, STOC 1987.

[32]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[33]  Cong Wang,et al.  Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations , 2011, 2011 31st International Conference on Distributed Computing Systems.

[34]  Yunghsiang Sam Han,et al.  Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification , 2004, SDM.

[35]  Eugene H. Spafford,et al.  Secure outsourcing of scientific computations , 2001, Adv. Comput..

[36]  Lihua Liu,et al.  Comment on “Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations” , 2016, IEEE Transactions on Parallel and Distributed Systems.

[37]  Wenliang Du,et al.  Privacy-preserving cooperative scientific computations , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[38]  Mikhail J. Atallah,et al.  Private and Cheating-Free Outsourcing of Algebraic Computations , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.

[39]  Craig Gentry,et al.  Computing arbitrary functions of encrypted data , 2010, CACM.

[40]  Sean W. Smith,et al.  Building a high-performance, programmable secure coprocessor , 1999, Comput. Networks.

[41]  Yihua Zhang,et al.  Secure and Verifiable Outsourcing of Large-Scale Biometric Computations , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[42]  Fabian Monrose,et al.  Distributed Execution with Remote Audit , 1999, NDSS.

[43]  Craig Gentry,et al.  A fully homomorphic encryption scheme , 2009 .

[44]  Florian Kerschbaum,et al.  Practical Privacy-Preserving Multiparty Linear Programming Based on Problem Transformation , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[45]  Tao Xiang,et al.  Highly Efficient Linear Regression Outsourcing to a Cloud , 2014, IEEE Transactions on Cloud Computing.

[46]  Cong Wang,et al.  Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations , 2013, IEEE Transactions on Parallel and Distributed Systems.

[47]  Ivan Damgård,et al.  Secure Distributed Linear Algebra in a Constant Number of Rounds , 2001, CRYPTO.

[48]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[49]  Enav Weinreb,et al.  Communication Efficient Secure Linear Algebra , 2006, TCC.

[50]  Tingwen Huang,et al.  Outsourcing Large Matrix Inversion Computation to A Public Cloud , 2013, IEEE Transactions on Cloud Computing.