4.7 Article

Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations

Journal

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TPDS.2012.206

Keywords

Confidential data; computation outsourcing; system of linear equations; cloud computing

Funding

  1. US National Science Foundation (NSF) [CNS-1262277, CNS-1116939]
  2. Amazon web service research grant
  3. Direct For Computer & Info Scie & Enginr
  4. Division Of Computer and Network Systems [1116939] Funding Source: National Science Foundation
  5. Division Of Computer and Network Systems
  6. Direct For Computer & Info Scie & Enginr [1262277] Funding Source: National Science Foundation

Ask authors/readers for more resources

Cloud computing economically enables customers with limited computational resources to outsource large-scale computations to the cloud. However, how to protect customers' confidential data involved in the computations then becomes a major security concern. In this paper, we present a secure outsourcing mechanism for solving large-scale systems of linear equations (LE) in cloud. Because applying traditional approaches like Gaussian elimination or LU decomposition (aka. direct method) to such large-scale LEs would be prohibitively expensive, we build the secure LE outsourcing mechanism via a completely different approach-iterative method, which is much easier to implement in practice and only demands relatively simpler matrix-vector operations. Specifically, our mechanism enables a customer to securely harness the cloud for iteratively finding successive approximations to the LE solution, while keeping both the sensitive input and output of the computation private. For robust cheating detection, we further explore the algebraic property of matrix-vector operations and propose an efficient result verification mechanism, which allows the customer to verify all answers received from previous iterative approximations in one batch with high probability. Thorough security analysis and prototype experiments on Amazon EC2 demonstrate the validity and practicality of our proposed design.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available