MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication

Cloud service provider that is equipped with tremendous resources enables the terminals with constrained resources to perform outsourced query or computation on large scale data. Security challenges are always the research hotspots in the outsourced computation community. In this paper, we investigate the problem of publicly verifiable outsourced matrix multiplication. However, in the state-of-the-art scheme, a large number of computationally expensive operations are adopted to achieve the goal of public verification. Thus, the state-of-the-art scheme works inefficiently actually due to the fact that most of the time is spent on the verification-related computing. To lower the verification-related time cost, we propose an efficient scheme for public verification of outsourced matrix multiplication. The two-dimensional matrix is transformed into a one-dimensional vector, which retains the computing ability and is used as the substitute for subsequent verification-related work. The security analysis demonstrates the security of the proposed outsourcing scheme, and the performance analysis shows the running efficiency of the scheme.

[1]  Tao Xiang,et al.  Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud , 2014, J. Parallel Distributed Comput..

[2]  Shaojie Tang,et al.  Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation , 2013, 2013 Proceedings IEEE INFOCOM.

[3]  Michael Backes,et al.  Verifiable delegation of computation on outsourced data , 2013, CCS.

[4]  Xuhui Chen,et al.  Efficient secure outsourcing of large-scale linear systems of equations , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[5]  Lu Li,et al.  Efficient secure similarity computation on encrypted trajectory data , 2015, 2015 IEEE 31st International Conference on Data Engineering.

[6]  Tingwen Huang,et al.  Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud , 2014, Inf. Sci..

[7]  Payman Mohassel,et al.  Efficient and Secure Delegation of Linear Algebra , 2011, IACR Cryptol. ePrint Arch..

[8]  Chris Clifton,et al.  Efficient privacy-preserving similar document detection , 2010, The VLDB Journal.

[9]  Xing Hu,et al.  Veri able and secure outsourcing of matrix calculation and its application , 2013 .

[10]  Mikhail J. Atallah,et al.  Private and Cheating-Free Outsourcing of Algebraic Computations , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.

[11]  Jianfeng Wang,et al.  Verifiable Algorithm for Secure Outsourcing of Systems of Linear Equations in the Case of No Solution , 2014, 2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications.

[12]  Craig Gentry,et al.  Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.

[13]  Mikhail J. Atallah,et al.  Securely outsourcing linear algebra computations , 2010, ASIACCS '10.

[14]  Yin Ying Secure Scalar Product Computation of Vectors in Cloud Computing , 2013 .

[15]  Cong Wang,et al.  Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations , 2013, IEEE Transactions on Parallel and Distributed Systems.

[16]  Tingwen Huang,et al.  Outsourcing Large Matrix Inversion Computation to A Public Cloud , 2013, IEEE Transactions on Cloud Computing.

[17]  Hongwei Li,et al.  Enabling Efficient and Secure Outsourcing of Large Matrix Multiplications , 2014, GLOBECOM 2014.

[18]  Jin Li,et al.  New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations , 2015, IEEE Transactions on Information Forensics and Security.

[19]  Rosario Gennaro,et al.  Publicly verifiable delegation of large polynomials and matrix computations, with applications , 2012, IACR Cryptol. ePrint Arch..

[20]  Angelo De Caro,et al.  jPBC: Java pairing based cryptography , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).

[21]  Tingwen Huang,et al.  Cloud Computing Service: The Caseof Large Matrix Determinant Computation , 2015, IEEE Transactions on Services Computing.

[22]  Chunming Tang,et al.  Privacy-preserving face recognition with outsourced computation , 2016, Soft Comput..

[23]  Cong Wang,et al.  Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.

[24]  Yuan-Shun Dai,et al.  Enabling efficient publicly verifiable outsourcing computation for matrix multiplication , 2015, 2015 International Telecommunication Networks and Applications Conference (ITNAC).