4.7 Article

Privacy-Preserving and Secure Cloud Computing: A Case of Large-Scale Nonlinear Programming

期刊

IEEE TRANSACTIONS ON CLOUD COMPUTING
卷 11, 期 1, 页码 484-498

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCC.2021.3099720

关键词

Cloud computing; Servers; Privacy; Outsourcing; Protocols; Gradient methods; Task analysis; privacy; security; nonlinear programming

向作者/读者索取更多资源

The increasing volume of data presents a challenge for users with limited resources to process and analyze it. One solution is to outsource computation-intensive tasks to the cloud for its powerful computing capability. However, this raises privacy and security concerns. This article focuses on the privacy-preserving and secure outsourcing of large-scale nonlinear programming problems in the context of cloud computing and proposes an outsourcing protocol that encrypts private information and uses efficient methods to solve the transformed problems.
The volume of data is increasing rapidly, which poses a great challenge for resource-constrained users to process and analyze. A promising approach for solving computation-intensive tasks over big data is to outsource them to the cloud to take advantage of the cloud's powerful computing capability. However, it also brings privacy and security issues since the data uploaded to the cloud may contain sensitive and private information which should be protected. In this article, we address this problem and focus on the privacy-preserving and secure outsourcing of large-scale nonlinear programming problems (NLPs) subject to both linear constraints and nonlinear constraints. Large-scale NLPs play an important role in the field of data analytics but have not received enough attention in the context of cloud computing. In our outsourcing protocol, we first apply a secure and efficient transformation scheme at the client side to encrypt the private information of the considered NLP. Then, we use the reduced gradient method and generalized gradient method at the server side to solve the transformed large-scale NLPs under linear constraints and nonlinear constraints, respectively. We provide security analysis of the proposed protocol, and evaluate its performance via a series of experiments. The experimental results show that our protocol can efficiently solve large-scale NLPs and save much time for the client, providing a great potential for real applications.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据