Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method
With the recent growth and commercialization of cloud computing, outsourcing computation has become one of the most important cloud services, which allows the resource-constrained clients to efficiently perform large-scale computation in a pay-per-use manner. Meanwhile, outsourcing large scale compu...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8700179/ |
id |
doaj-0ebbb234518d485d91a148b21b2c8726 |
---|---|
record_format |
Article |
spelling |
doaj-0ebbb234518d485d91a148b21b2c87262021-03-29T22:03:50ZengIEEEIEEE Access2169-35362019-01-017538235383810.1109/ACCESS.2019.29135918700179Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption MethodShengxia Zhang0Chengliang Tian1https://orcid.org/0000-0002-2474-910XHanlin Zhang2Jia Yu3https://orcid.org/0000-0002-0574-7803Fengjun Li4College of Computer Science and Technology, Qingdao University, Qingdao, ChinaCollege of Computer Science and Technology, Qingdao University, Qingdao, ChinaCollege of Computer Science and Technology, Qingdao University, Qingdao, ChinaCollege of Computer Science and Technology, Qingdao University, Qingdao, ChinaDepartment of Electrical Engineering and Computer Science, The University of Kansas, Lawrence, KS, USAWith the recent growth and commercialization of cloud computing, outsourcing computation has become one of the most important cloud services, which allows the resource-constrained clients to efficiently perform large-scale computation in a pay-per-use manner. Meanwhile, outsourcing large scale computing problems and computationally intensive applications to the cloud has become prevalent in the science and engineering computing community. As important fundamental operations, large-scale matrix multiplication computation (MMC), matrix inversion computation (MIC), and matrix determinant computation (MDC) have been frequently used. In this paper, we present three new algorithms to enable secure, verifiable, and efficient outsourcing of MMC, MIC, and MDC operations to a cloud that may be potentially malicious. The main idea behind our algorithms is a novel matrix encryption/decryption method utilizing consecutive and sparse unimodular matrix transformations. Compared to previous works, this versatile technique can be applied to many matrix operations while achieving a good balance between security and efficiency. First, the proposed algorithms provide robust confidentiality by concealing the local information of the entries in the input matrices. Besides, they also protect the statistic information of the original matrix. Moreover, these algorithms are highly efficient. Our theoretical analysis indicates that the proposed algorithms reduce the time overhead on the client side from O(n<sup>2.3728639</sup>) to O(n<sup>2</sup>). Finally, the extensive experimental evaluations demonstrate the practical efficiency and effectiveness of our algorithms.https://ieeexplore.ieee.org/document/8700179/Cloud computingoutsourcing computationmatrix operationsprivacyefficiency |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Shengxia Zhang Chengliang Tian Hanlin Zhang Jia Yu Fengjun Li |
spellingShingle |
Shengxia Zhang Chengliang Tian Hanlin Zhang Jia Yu Fengjun Li Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method IEEE Access Cloud computing outsourcing computation matrix operations privacy efficiency |
author_facet |
Shengxia Zhang Chengliang Tian Hanlin Zhang Jia Yu Fengjun Li |
author_sort |
Shengxia Zhang |
title |
Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method |
title_short |
Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method |
title_full |
Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method |
title_fullStr |
Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method |
title_full_unstemmed |
Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method |
title_sort |
practical and secure outsourcing algorithms of matrix operations based on a novel matrix encryption method |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2019-01-01 |
description |
With the recent growth and commercialization of cloud computing, outsourcing computation has become one of the most important cloud services, which allows the resource-constrained clients to efficiently perform large-scale computation in a pay-per-use manner. Meanwhile, outsourcing large scale computing problems and computationally intensive applications to the cloud has become prevalent in the science and engineering computing community. As important fundamental operations, large-scale matrix multiplication computation (MMC), matrix inversion computation (MIC), and matrix determinant computation (MDC) have been frequently used. In this paper, we present three new algorithms to enable secure, verifiable, and efficient outsourcing of MMC, MIC, and MDC operations to a cloud that may be potentially malicious. The main idea behind our algorithms is a novel matrix encryption/decryption method utilizing consecutive and sparse unimodular matrix transformations. Compared to previous works, this versatile technique can be applied to many matrix operations while achieving a good balance between security and efficiency. First, the proposed algorithms provide robust confidentiality by concealing the local information of the entries in the input matrices. Besides, they also protect the statistic information of the original matrix. Moreover, these algorithms are highly efficient. Our theoretical analysis indicates that the proposed algorithms reduce the time overhead on the client side from O(n<sup>2.3728639</sup>) to O(n<sup>2</sup>). Finally, the extensive experimental evaluations demonstrate the practical efficiency and effectiveness of our algorithms. |
topic |
Cloud computing outsourcing computation matrix operations privacy efficiency |
url |
https://ieeexplore.ieee.org/document/8700179/ |
work_keys_str_mv |
AT shengxiazhang practicalandsecureoutsourcingalgorithmsofmatrixoperationsbasedonanovelmatrixencryptionmethod AT chengliangtian practicalandsecureoutsourcingalgorithmsofmatrixoperationsbasedonanovelmatrixencryptionmethod AT hanlinzhang practicalandsecureoutsourcingalgorithmsofmatrixoperationsbasedonanovelmatrixencryptionmethod AT jiayu practicalandsecureoutsourcingalgorithmsofmatrixoperationsbasedonanovelmatrixencryptionmethod AT fengjunli practicalandsecureoutsourcingalgorithmsofmatrixoperationsbasedonanovelmatrixencryptionmethod |
_version_ |
1724192241830854656 |