Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method

With the recent growth and commercialization of cloud computing, outsourcing computation has become one of the most important cloud services, which allows the resource-constrained clients to efficiently perform large-scale computation in a pay-per-use manner. Meanwhile, outsourcing large scale compu...

Full description

Bibliographic Details
Main Authors: Shengxia Zhang, Chengliang Tian, Hanlin Zhang, Jia Yu, Fengjun Li
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8700179/
id doaj-0ebbb234518d485d91a148b21b2c8726
record_format Article
spelling doaj-0ebbb234518d485d91a148b21b2c87262021-03-29T22:03:50ZengIEEEIEEE Access2169-35362019-01-017538235383810.1109/ACCESS.2019.29135918700179Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption MethodShengxia Zhang0Chengliang Tian1https://orcid.org/0000-0002-2474-910XHanlin Zhang2Jia Yu3https://orcid.org/0000-0002-0574-7803Fengjun Li4College of Computer Science and Technology, Qingdao University, Qingdao, ChinaCollege of Computer Science and Technology, Qingdao University, Qingdao, ChinaCollege of Computer Science and Technology, Qingdao University, Qingdao, ChinaCollege of Computer Science and Technology, Qingdao University, Qingdao, ChinaDepartment of Electrical Engineering and Computer Science, The University of Kansas, Lawrence, KS, USAWith the recent growth and commercialization of cloud computing, outsourcing computation has become one of the most important cloud services, which allows the resource-constrained clients to efficiently perform large-scale computation in a pay-per-use manner. Meanwhile, outsourcing large scale computing problems and computationally intensive applications to the cloud has become prevalent in the science and engineering computing community. As important fundamental operations, large-scale matrix multiplication computation (MMC), matrix inversion computation (MIC), and matrix determinant computation (MDC) have been frequently used. In this paper, we present three new algorithms to enable secure, verifiable, and efficient outsourcing of MMC, MIC, and MDC operations to a cloud that may be potentially malicious. The main idea behind our algorithms is a novel matrix encryption/decryption method utilizing consecutive and sparse unimodular matrix transformations. Compared to previous works, this versatile technique can be applied to many matrix operations while achieving a good balance between security and efficiency. First, the proposed algorithms provide robust confidentiality by concealing the local information of the entries in the input matrices. Besides, they also protect the statistic information of the original matrix. Moreover, these algorithms are highly efficient. Our theoretical analysis indicates that the proposed algorithms reduce the time overhead on the client side from O(n<sup>2.3728639</sup>) to O(n<sup>2</sup>). Finally, the extensive experimental evaluations demonstrate the practical efficiency and effectiveness of our algorithms.https://ieeexplore.ieee.org/document/8700179/Cloud computingoutsourcing computationmatrix operationsprivacyefficiency
collection DOAJ
language English
format Article
sources DOAJ
author Shengxia Zhang
Chengliang Tian
Hanlin Zhang
Jia Yu
Fengjun Li
spellingShingle Shengxia Zhang
Chengliang Tian
Hanlin Zhang
Jia Yu
Fengjun Li
Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method
IEEE Access
Cloud computing
outsourcing computation
matrix operations
privacy
efficiency
author_facet Shengxia Zhang
Chengliang Tian
Hanlin Zhang
Jia Yu
Fengjun Li
author_sort Shengxia Zhang
title Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method
title_short Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method
title_full Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method
title_fullStr Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method
title_full_unstemmed Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method
title_sort practical and secure outsourcing algorithms of matrix operations based on a novel matrix encryption method
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2019-01-01
description With the recent growth and commercialization of cloud computing, outsourcing computation has become one of the most important cloud services, which allows the resource-constrained clients to efficiently perform large-scale computation in a pay-per-use manner. Meanwhile, outsourcing large scale computing problems and computationally intensive applications to the cloud has become prevalent in the science and engineering computing community. As important fundamental operations, large-scale matrix multiplication computation (MMC), matrix inversion computation (MIC), and matrix determinant computation (MDC) have been frequently used. In this paper, we present three new algorithms to enable secure, verifiable, and efficient outsourcing of MMC, MIC, and MDC operations to a cloud that may be potentially malicious. The main idea behind our algorithms is a novel matrix encryption/decryption method utilizing consecutive and sparse unimodular matrix transformations. Compared to previous works, this versatile technique can be applied to many matrix operations while achieving a good balance between security and efficiency. First, the proposed algorithms provide robust confidentiality by concealing the local information of the entries in the input matrices. Besides, they also protect the statistic information of the original matrix. Moreover, these algorithms are highly efficient. Our theoretical analysis indicates that the proposed algorithms reduce the time overhead on the client side from O(n<sup>2.3728639</sup>) to O(n<sup>2</sup>). Finally, the extensive experimental evaluations demonstrate the practical efficiency and effectiveness of our algorithms.
topic Cloud computing
outsourcing computation
matrix operations
privacy
efficiency
url https://ieeexplore.ieee.org/document/8700179/
work_keys_str_mv AT shengxiazhang practicalandsecureoutsourcingalgorithmsofmatrixoperationsbasedonanovelmatrixencryptionmethod
AT chengliangtian practicalandsecureoutsourcingalgorithmsofmatrixoperationsbasedonanovelmatrixencryptionmethod
AT hanlinzhang practicalandsecureoutsourcingalgorithmsofmatrixoperationsbasedonanovelmatrixencryptionmethod
AT jiayu practicalandsecureoutsourcingalgorithmsofmatrixoperationsbasedonanovelmatrixencryptionmethod
AT fengjunli practicalandsecureoutsourcingalgorithmsofmatrixoperationsbasedonanovelmatrixencryptionmethod
_version_ 1724192241830854656