Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method

With the recent growth and commercialization of cloud computing, outsourcing computation has become one of the most important cloud services, which allows the resource-constrained clients to efficiently perform large-scale computation in a pay-per-use manner. Meanwhile, outsourcing large scale computing problems and computationally intensive applications to the cloud has become prevalent in the science and engineering computing community. As important fundamental operations, large-scale matrix multiplication computation (MMC), matrix inversion computation (MIC), and matrix determinant computation (MDC) have been frequently used. In this paper, we present three new algorithms to enable secure, verifiable, and efficient outsourcing of MMC, MIC, and MDC operations to a cloud that may be potentially malicious. The main idea behind our algorithms is a novel matrix encryption/decryption method utilizing consecutive and sparse unimodular matrix transformations. Compared to previous works, this versatile technique can be applied to many matrix operations while achieving a good balance between security and efficiency. First, the proposed algorithms provide robust confidentiality by concealing the local information of the entries in the input matrices. Besides, they also protect the statistic information of the original matrix. Moreover, these algorithms are highly efficient. Our theoretical analysis indicates that the proposed algorithms reduce the time overhead on the client side from $O(n^{2.3728639})$ to $O(n^{2})$ . Finally, the extensive experimental evaluations demonstrate the practical efficiency and effectiveness of our algorithms.

[1]  Jianfeng Ma,et al.  Verifiable Computation over Large Database with Incremental Updates , 2014, IEEE Transactions on Computers.

[2]  Jianfeng Ma,et al.  New Publicly Verifiable Databases with Efficient Updates , 2015, IEEE Transactions on Dependable and Secure Computing.

[3]  Duncan S. Wong,et al.  Secure Outsourced Attribute-Based Signatures , 2014, IEEE Transactions on Parallel and Distributed Systems.

[4]  Eugene H. Spafford,et al.  Secure outsourcing of scientific computations , 2001, Adv. Comput..

[5]  Robert J. McEliece,et al.  A public key cryptosystem based on algebraic coding theory , 1978 .

[6]  François Le Gall,et al.  Powers of tensors and fast matrix multiplication , 2014, ISSAC.

[7]  David K. Smith Theory of Linear and Integer Programming , 1987 .

[8]  L. Tippett Statistical Tables: For Biological, Agricultural and Medical Research , 1954 .

[9]  Mikhail J. Atallah,et al.  Private and Cheating-Free Outsourcing of Algebraic Computations , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.

[10]  Marina Blanton,et al.  Practical Secure Computation Outsourcing , 2018, ACM Comput. Surv..

[11]  Ming Xu,et al.  A Secure Algorithm for Outsourcing Matrix Multiplication Computation in the Cloud , 2017, SCC@AsiaCCS.

[12]  Tao Jiang,et al.  New publicly verifiable computation for batch matrix multiplication , 2019, Inf. Sci..

[13]  Xuhui Chen,et al.  Efficient secure outsourcing of large-scale linear systems of equations , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[14]  Tingwen Huang,et al.  Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud , 2014, Inf. Sci..

[15]  Payman Mohassel,et al.  Efficient and Secure Delegation of Linear Algebra , 2011, IACR Cryptol. ePrint Arch..

[16]  R. McEliece Finite Fields for Computer Scientists and Engineers , 1986 .

[17]  Ravindranath Tagore,et al.  PERMUTATION AND COMBINATIONS APPROACH TO PROGRAM EVALUATION AND REVIEW TECHNIQUE , 2007 .

[18]  Tingwen Huang,et al.  Outsourcing Large Matrix Inversion Computation to A Public Cloud , 2013, IEEE Transactions on Cloud Computing.

[19]  Refik Molva,et al.  Efficient Techniques for Publicly Verifiable Delegation of Computation , 2016, AsiaCCS.

[20]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[21]  Rosario Gennaro,et al.  Publicly verifiable delegation of large polynomials and matrix computations, with applications , 2012, IACR Cryptol. ePrint Arch..

[22]  Tingwen Huang,et al.  Cloud Computing Service: The Caseof Large Matrix Determinant Computation , 2015, IEEE Transactions on Services Computing.

[23]  Ronald L. Rivest,et al.  Introduction to Algorithms , 1990 .

[24]  Rongxing Lu,et al.  Verifiable Outsourcing Computation for Matrix Multiplication With Improved Efficiency and Applicability , 2018, IEEE Internet of Things Journal.

[25]  Peter J. Haas,et al.  Large-scale matrix factorization with distributed stochastic gradient descent , 2011, KDD.

[26]  R. A. Fisher,et al.  Statistical Tables for Biological, Agricultural and Medical Research , 1956 .

[27]  Phillip Barkan,et al.  Kinematics and Dynamics of Planar Machinery , 1979 .

[28]  G. Golub,et al.  Some large-scale matrix computation problems , 1996 .

[29]  Jianfeng Ma,et al.  New Algorithms for Secure Outsourcing of Modular Exponentiations , 2014, IEEE Trans. Parallel Distributed Syst..

[30]  Chengliang Tian,et al.  How to securely outsource the inversion modulo a large composite number , 2017, J. Syst. Softw..

[31]  Craig Gentry,et al.  A Simple BGN-Type Cryptosystem from LWE , 2010, EUROCRYPT.

[32]  B. Carpentieri Sparse preconditioners for dense linear systems from electromagnetic applications , 2002 .

[33]  Dennis S. Bernstein,et al.  Matrix Mathematics: Theory, Facts, and Formulas with Application to Linear Systems Theory , 2005 .

[34]  Victor Y. Pan,et al.  Efficient parallel solution of linear systems , 1985, STOC '85.

[35]  Yihua Zhang,et al.  Efficient Secure and Verifiable Outsourcing of Matrix Multiplications , 2014, ISC.

[36]  Xuhui Chen,et al.  A tutorial on secure outsourcing of large-scale computations for big data , 2016, IEEE Access.

[37]  Mikhail J. Atallah,et al.  Securely outsourcing linear algebra computations , 2010, ASIACCS '10.

[38]  Ron M. Roth,et al.  Introduction to Coding Theory , 2019, Discrete Mathematics.

[39]  Yuan-Shun Dai,et al.  Efficient Secure Outsourcing Computation of Matrix Multiplication in Cloud Computing , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).

[40]  Xing Hu,et al.  Secure outsourced computation of the characteristic polynomial and eigenvalues of matrix , 2015, Journal of Cloud Computing.

[41]  Charles R. Johnson,et al.  Necessary And Sufficient Conditions For Existence of the LU Factorization of an Arbitrary Matrix , 2005 .

[42]  Kurt Bryan,et al.  The $25,000,000,000 Eigenvector: The Linear Algebra behind Google , 2006, SIAM Rev..

[43]  Ronald L. Rivest,et al.  Introduction to Algorithms, 3rd Edition , 2009 .

[44]  Wei Gao,et al.  MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication , 2016, NSS.

[45]  Erdem Alkim,et al.  Post-quantum Key Exchange - A New Hope , 2016, USENIX Security Symposium.

[46]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[47]  Jin Li,et al.  New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations , 2015, IEEE Transactions on Information Forensics and Security.