Abstract
Large-Scale matrix determinant computation (LMDC) is a common scientific and engineering computational task and has a number of applications. But such computation involves enormous computing resources, which is burdensome for the clients. Cloud computing enables computational resource-constrained clients to economically outsource such computations to the cloud server. In this paper, we investigate the privacy-preserving large-scale matrix determinant computation outsourcing problem, where the clients can outsource LMDC to the untrusted cloud server, relieving the clients from computation burden. We propose a new privacy-preserving algorithm for outsourcing LMDC, which substantially reduces the computation burden on the client side. Our algorithm builds on a series of carefully-designed pseudorandom matrices, which can hide the original matrix from the cloud server with low computational complexity. The extensive security analysis shows that our algorithm is practically-secure, and offers a higher level of privacy protection than the state-of-the-art on LMDC outsourcing. We provide extensive theoretical analysis and experimental evaluation to show its high-efficiency and security compared to the previous works.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Demirkan, H., Delen, D.: Leveraging the capabilities of service-oriented decision support systems: putting analytics and big data in cloud. Decis. Support Sys. 55, 412–421 (2013)
Wang, Q., Hu, S., Ren, K., He, M., Du, M., Wang, Z.: CloudBI: practical privacy-preserving outsourcing of biometric identification in the cloud. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9327, pp. 186–205. Springer, Cham (2015). doi:10.1007/978-3-319-24177-7_10
Fu, Z., Ren, K., Shu, J., et al.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27, 2546–2559 (2016)
Xia, Z., Wang, X., et al.: A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11, 2594–2608 (2016)
Sakr, S., et al.: A survey of large scale data management approaches in cloud environments. IEEE Commun. Surv. Tutor. 13, 311–336 (2011)
Peng, B.: The Determinant: A Means to Calculate Volume (2011)
Biswas, S.N., et al.: The hill determinant: an application to the anharmonic oscillator. Phys. Rev. D 4, 3617–3620 (1971)
Seccombe, A., et al.: Security guidance for critical areas of focus in cloud computing. Evidence and Cloud Computing the VMI Approach Poisel Malzer and Tjoa (2009)
Mohassel, P.: Efficient and Secure Delegation of Linear Algebra. IACR Cryptology Eprint Archive (2011)
Lei, X., et al.: Cloud computing service: the case of large matrix determinant computation. IEEE Trans. Serv. Comput. 8, 688–700 (2015)
Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465–482. Springer, Heidelberg (2010). doi:10.1007/978-3-642-14623-7_25
Yu, Y., et al.: Efficient, secure and non-iterative outsourcing of large-scale systems of linear equations. In: 2016 IEEE International Conference on Communications, pp. 1–6. IEEE Press, Kuala Lumpur (2016)
Katz, J., Lindell, Y.: Introduction to Modern Cryptography: Principles and Protocols. Chapman & Hall/CRC, Boca Raton (2007)
Salinas, S., et al.: Efficient secure outsourcing of large-scale linear systems of equations. In: 2015 International Conference on Computer Communications, pp. 1035–1043. IEEE Press, Hong Kong (2015)
Meyer, C.D.: Matrix Analysis and Applied Linear Algebra. Society for Industrial and Applied Mathematics, Philadelphia (2000)
Matsumoto, M., Nishimura, T.: Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Trans. Model Comput. Simul. 8, 3–30 (1998)
Acknowledgments
This work is supported by the Open Foundation of State Key Laboratory of Cryptology (No: MMKFKT201617), National Nature Science Foundation of China under grant 61572026, 61672195 and 61379144, the Foundation of Science and Technology on Information Assurance Laboratory (No: KJ-15-001).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Fu, S., Yu, Y., Xu, M. (2017). Practical Privacy-Preserving Outsourcing of Large-Scale Matrix Determinant Computation in the Cloud. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10603. Springer, Cham. https://doi.org/10.1007/978-3-319-68542-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-68542-7_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68541-0
Online ISBN: 978-3-319-68542-7
eBook Packages: Computer ScienceComputer Science (R0)