4.6 Article

Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud

期刊

SENSORS
卷 21, 期 20, 页码 -

出版社

MDPI
DOI: 10.3390/s21206821

关键词

matrix determinant; secure outsourcing; cloud computing

资金

  1. Science and Technology Program of Guangzhou, China [201904010209]
  2. Science and Technology Program of Guangdong Province, China [2017A010101039]

向作者/读者索取更多资源

This paper introduces a secure outsourcing algorithm for computing the determinant of large matrices under a malicious cloud model. It protects the privacy of the original matrix by applying row/column permutation and other transformations, and utilizes a new verification method to resist malicious cheating.
Computing the determinant of large matrix is a time-consuming task, which is appearing more and more widely in science and engineering problems in the era of big data. Fortunately, cloud computing can provide large storage and computation resources, and thus, act as an ideal platform to complete computation outsourced from resource-constrained devices. However, cloud computing also causes security issues. For example, the curious cloud may spy on user privacy through outsourced data. The malicious cloud violating computing scripts, as well as cloud hardware failure, will lead to incorrect results. Therefore, we propose a secure outsourcing algorithm to compute the determinant of large matrix under the malicious cloud mode in this paper. The algorithm protects the privacy of the original matrix by applying row/column permutation and other transformations to the matrix. To resist malicious cheating on the computation tasks, a new verification method is utilized in our algorithm. Unlike previous algorithms that require multiple rounds of verification, our verification requires only one round without trading off the cheating detectability, which greatly reduces the local computation burden. Both theoretical and experimental analysis demonstrate that our algorithm achieves a better efficiency on local users than previous ones on various dimensions of matrices, without sacrificing the security requirements in terms of privacy protection and cheating detectability.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据