Secure and Verifiable Outsourcing of Large-Scale Matrix Inversion without Precondition in Cloud Computing

Large-scale matrix computation requires a lot of computing resources, but the emergence of cloud computing provides resource-limited users with an economical solution, namely outsourcing computation. Clients can use pay-per-use service of cloud resources to solve complex issues, such as matrix inversion. However, due to the inclusion of privacy information in users' data and the opacity of the calculation operations, clients are in face of the threats of privacy disclosure and fraud. In this paper, we first propose an efficient and secure scheme without precondition for outsourcing large- scale matrix inversion to a public cloud. Compared to the state-of-the-art schemes, our scheme does not require the precondition that the original matrix should be invertible. It relieves clients from checking the invertibility of matrix, which is hard to be implemented with limited resource in reality. Moreover, our scheme can protect clients from being cheated and provide data privacy protection. Experiment results also show that our scheme is highly efficient in practical.

[1]  Jinguang Han,et al.  VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud , 2020, IEEE Transactions on Services Computing.

[2]  Anmin Fu,et al.  Privacy-preserving public auditing for non-manager group , 2017, 2017 IEEE International Conference on Communications (ICC).

[3]  Abdelkarim Erradi,et al.  Practical and Secure Outsourcing of Matrix Computations to the Cloud , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops.

[4]  Cong Wang,et al.  Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations , 2013, IEEE Transactions on Parallel and Distributed Systems.

[5]  Anmin Fu,et al.  NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users , 2017, IEEE Transactions on Big Data.

[6]  Mikhail J. Atallah,et al.  Private and Cheating-Free Outsourcing of Algebraic Computations , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.

[7]  Yuan Zhou,et al.  Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations , 2016, ACISP.

[8]  Arwa Alrawais,et al.  A secure and verifiable outsourcing scheme for matrix inverse computation , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[9]  Ming Xu,et al.  Efficient, secure and non-iterative outsourcing of large-scale systems of linear equations , 2016, 2016 IEEE International Conference on Communications (ICC).

[10]  Ximeng Liu,et al.  An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys , 2016, IEEE Transactions on Information Forensics and Security.

[11]  Sanming Zhou,et al.  Networking for Big Data: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[12]  Tingwen Huang,et al.  Cloud Computing Service: The Caseof Large Matrix Determinant Computation , 2015, IEEE Transactions on Services Computing.

[13]  Xuhui Chen,et al.  Efficient secure outsourcing of large-scale linear systems of equations , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[14]  Jin Li,et al.  New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations , 2015, IEEE Transactions on Information Forensics and Security.

[15]  Yuan-Shun Dai,et al.  Efficient Secure Outsourcing Computation of Matrix Multiplication in Cloud Computing , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[16]  Shui Yu,et al.  Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data , 2016, IEEE Access.

[17]  John Yearwood,et al.  CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server , 2017, Digit. Commun. Networks.

[18]  Lifeng Zhou,et al.  Outsourcing Eigen-Decomposition and Singular Value Decomposition of Large Matrix to a Public Cloud , 2016, IEEE Access.

[19]  Yan Yu,et al.  IPOR: An efficient IDA-based proof of retrievability scheme for cloud storage systems , 2017, 2017 IEEE International Conference on Communications (ICC).

[20]  Guangjun Liu,et al.  RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data , 2017, Mobile Networks and Applications.

[21]  Tingwen Huang,et al.  Outsourcing Large Matrix Inversion Computation to A Public Cloud , 2013, IEEE Transactions on Cloud Computing.

[22]  Hongwei Li,et al.  Enabling Efficient and Secure Outsourcing of Large Matrix Multiplications , 2014, GLOBECOM 2014.

[23]  Mikhail J. Atallah,et al.  Securely outsourcing linear algebra computations , 2010, ASIACCS '10.