Cargando…

Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud

Computing the determinant of large matrix is a time-consuming task, which is appearing more and more widely in science and engineering problems in the era of big data. Fortunately, cloud computing can provide large storage and computation resources, and thus, act as an ideal platform to complete com...

Descripción completa

Detalles Bibliográficos
Autores principales: Song, Mingyang, Sang, Yingpeng
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8539666/
https://www.ncbi.nlm.nih.gov/pubmed/34696034
http://dx.doi.org/10.3390/s21206821
_version_ 1784588802264662016
author Song, Mingyang
Sang, Yingpeng
author_facet Song, Mingyang
Sang, Yingpeng
author_sort Song, Mingyang
collection PubMed
description Computing the determinant of large matrix is a time-consuming task, which is appearing more and more widely in science and engineering problems in the era of big data. Fortunately, cloud computing can provide large storage and computation resources, and thus, act as an ideal platform to complete computation outsourced from resource-constrained devices. However, cloud computing also causes security issues. For example, the curious cloud may spy on user privacy through outsourced data. The malicious cloud violating computing scripts, as well as cloud hardware failure, will lead to incorrect results. Therefore, we propose a secure outsourcing algorithm to compute the determinant of large matrix under the malicious cloud mode in this paper. The algorithm protects the privacy of the original matrix by applying row/column permutation and other transformations to the matrix. To resist malicious cheating on the computation tasks, a new verification method is utilized in our algorithm. Unlike previous algorithms that require multiple rounds of verification, our verification requires only one round without trading off the cheating detectability, which greatly reduces the local computation burden. Both theoretical and experimental analysis demonstrate that our algorithm achieves a better efficiency on local users than previous ones on various dimensions of matrices, without sacrificing the security requirements in terms of privacy protection and cheating detectability.
format Online
Article
Text
id pubmed-8539666
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-85396662021-10-24 Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud Song, Mingyang Sang, Yingpeng Sensors (Basel) Article Computing the determinant of large matrix is a time-consuming task, which is appearing more and more widely in science and engineering problems in the era of big data. Fortunately, cloud computing can provide large storage and computation resources, and thus, act as an ideal platform to complete computation outsourced from resource-constrained devices. However, cloud computing also causes security issues. For example, the curious cloud may spy on user privacy through outsourced data. The malicious cloud violating computing scripts, as well as cloud hardware failure, will lead to incorrect results. Therefore, we propose a secure outsourcing algorithm to compute the determinant of large matrix under the malicious cloud mode in this paper. The algorithm protects the privacy of the original matrix by applying row/column permutation and other transformations to the matrix. To resist malicious cheating on the computation tasks, a new verification method is utilized in our algorithm. Unlike previous algorithms that require multiple rounds of verification, our verification requires only one round without trading off the cheating detectability, which greatly reduces the local computation burden. Both theoretical and experimental analysis demonstrate that our algorithm achieves a better efficiency on local users than previous ones on various dimensions of matrices, without sacrificing the security requirements in terms of privacy protection and cheating detectability. MDPI 2021-10-14 /pmc/articles/PMC8539666/ /pubmed/34696034 http://dx.doi.org/10.3390/s21206821 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Song, Mingyang
Sang, Yingpeng
Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud
title Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud
title_full Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud
title_fullStr Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud
title_full_unstemmed Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud
title_short Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud
title_sort secure outsourcing of matrix determinant computation under the malicious cloud
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8539666/
https://www.ncbi.nlm.nih.gov/pubmed/34696034
http://dx.doi.org/10.3390/s21206821
work_keys_str_mv AT songmingyang secureoutsourcingofmatrixdeterminantcomputationunderthemaliciouscloud
AT sangyingpeng secureoutsourcingofmatrixdeterminantcomputationunderthemaliciouscloud