Skip to main content

Secure and Efficient Protocol for Outsourcing Large-Scale Systems of Linear Equations to the Cloud

  • Conference paper
  • First Online:
Book cover Cloud Computing and Security (ICCCS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9483))

Included in the following conference series:

Abstract

Cloud services enables clients using their limited resources to economically enjoy the massive computational power and storage of the public cloud. Nevertheless, this promising computing services inevitably brings in new threats and challenges, for example, input and output data privacy and cheating detection. Since large-scale systems of linear equations(LSLE) is widely rooted in many engineer and scientific applications. In this paper, for the first time, we utilize two non-colluding cloud servers to propose practical protocol for secure outsourcing LSLE in the fully malicious model. The new approach employs some efficient linear transformations but no expensive homomorphic encryptions system. Extensive theoretical analysis and the experimental evaluation demonstrates the correctness, efficiency, security and checkability of the method. In addition, compared with the existing algorithms, the protocol is superior in both efficiency and security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Armbrust, M., Fox, A., Griffith, R.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)

    Article  Google Scholar 

  2. Benzi, M.: Preconditioning techniques for large linear systems: a survey. J. Comput. Phy. 182(2), 418–477 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  3. Brunette G., Mogull R.: Security guidance for critical areas of focus in cloud computing v2. 1. Cloud Security Alliance, pp. 1–76 (2009)

    Google Scholar 

  4. Abadi M., Feigenbaum J., Kilian J.: On hiding information from an oracle. In: Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, pp. 195–203. ACM (1987)

    Google Scholar 

  5. Gentry, C.: Fully homomorphic encryption using ideal lattices. STOC 9, 169–178 (2009)

    Article  MathSciNet  Google Scholar 

  6. Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. Found. Sec. Comput. 4(11), 169–180 (1978)

    MathSciNet  Google Scholar 

  7. Benjamin, D., Atallah, M.J.: Private and cheating-free outsourcing of algebraic computations. In: Sixth Annual Conference on Privacy, Security and Trust, PST 2008, pp. 240–245. IEEE (2008)

    Google Scholar 

  8. Blanton, M., Atallah, M.J., Frikken, K.B., Malluhi, Q.: Secure and efficient outsourcing of sequence comparisons. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 505–522. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  9. Urs, K.M.R.: Harnessing the Cloud for Securely Outsourcing Large-scale Systems of Linear Equations

    Google Scholar 

  10. Saad, Y.: Iterative methods for sparse linear systems. Siam (2003)

    Google Scholar 

  11. Chen, F., Xiang, T., Yang, Y.: Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud. J. Parallel Distrib. Comput. 74(3), 2141–2151 (2014)

    Article  MATH  Google Scholar 

  12. Xiaofeng, C., Xinyi, H., Jin, L., Jianfeng, M., Wenjing, L., Wong D.: New Algorithms for Secure Outsourcing of Large-scale Systems of Linear Equations (2015)

    Google Scholar 

  13. Atallah, M.J., Frikken, K.B.: Securely outsourcing linear algebra computations. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 48–59. ACM (2010)

    Google Scholar 

  14. Elmehdwi, Y., Samanthula, B.K., Jiang, W.: Secure k-nearest neighbor query over encrypted data in outsourced environments. 2014 IEEE 30th International Conference on Data Engineering (ICDE), pp. 664–675. IEEE (2014)

    Google Scholar 

  15. Gibson, S.F.F., Mirtich, B.: A survey of deformable modeling in computer graphics. Technical report, Mitsubishi Electric Research Laboratories (1997)

    Google Scholar 

  16. Oppenheim, A.V., Willsky, A.S., Nawab, S.H.: Signals and systems. Prentice-Hall, Englewood Cliffs (1983)

    MATH  Google Scholar 

  17. Goldreich O., Micali S., Wigderson A.: How to play any mental game. In: Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, pp. 218–229. ACM (1987)

    Google Scholar 

  18. Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 264–282. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  19. Goldreich, O.: Computational complexity: a conceptual perspective. ACM SIGACT News 39(3), 35–39 (2008)

    Article  Google Scholar 

Download references

Acknowledgments

This work is partly supported by the Fundamental Research Funds for the Central Universities (No. NZ2015108), and the China Postdoctoral Science Foundation funded project (2015M571752), and the Jiangsu Planned Projects for Postdoctoral Research Funds (1402033C). and Open Project Foundation of Information Technology Research Base of Civil Aviation Administration of China(NO.CAAC-ITRB-201405).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cheng Qian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Qian, C., Wang, J. (2015). Secure and Efficient Protocol for Outsourcing Large-Scale Systems of Linear Equations to the Cloud. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds) Cloud Computing and Security. ICCCS 2015. Lecture Notes in Computer Science(), vol 9483. Springer, Cham. https://doi.org/10.1007/978-3-319-27051-7_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27051-7_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27050-0

  • Online ISBN: 978-3-319-27051-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics