Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations

作者: Cong Wang , Kui Ren , Jia Wang , Karthik Mahendra Raje Urs

DOI: 10.1109/ICDCS.2011.41

关键词:

摘要: Cloud computing economically enables customers with limited computational resources to outsource large-scale computations the cloud. However, how protect customers' confidential data involved in then becomes a major security concern. In this paper, we present secure outsourcing mechanism for solving systems of linear equations (LE) Because applying traditional approaches like Gaussian elimination or LU decomposition (aka. direct method) such LE problems would be prohibitively expensive, build via completely different approach -- iterative method, which is much easier implement practice and only demands relatively simpler matrix-vector operations. Specifically, our customer securely harness cloud iteratively finding successive approximations solution, while keeping both sensitive input output computation private. For robust cheating detection, further explore algebraic property operations propose an efficient result verification mechanism, allows verify all answers received from previous one batch high probability. Thorough analysis prototype experiments on Amazon EC2 demonstrate validity practicality proposed design.

参考文章(36)
Thomas H. Cormen, Introduction to algorithms [2nd ed.] MIT Press. ,(2001)
Philippe Golle, Ilya Mironov, Uncheatable Distributed Computations the cryptographers track at the rsa conference. ,vol. 2020, pp. 425- 440 ,(2001) , 10.1007/3-540-45353-9_31
Shuguo Han, Wee Keong Ng, None, Privacy-preserving linear fisher discriminant analysis knowledge discovery and data mining. pp. 136- 147 ,(2008) , 10.1007/978-3-540-68125-0_14
Rosario Gennaro, Craig Gentry, Bryan Parno, Non-interactive verifiable computing: outsourcing computation to untrusted workers international cryptology conference. ,vol. 2009, pp. 465- 482 ,(2010) , 10.1007/978-3-642-14623-7_25
Kobbi Nissim, Enav Weinreb, Communication Efficient Secure Linear Algebra Theory of Cryptography. pp. 522- 541 ,(2006) , 10.1007/11681878_27
Ronald Cramer, Ivan Damgård, Secure Distributed Linear Algebra in a Constant Number of Rounds international cryptology conference. pp. 119- 136 ,(2001) , 10.1007/3-540-44647-8_7
Mikhail J. Atallah, K.N. Pantazopoulos, John R. Rice, Eugene E. Spafford, Secure outsourcing of scientific computations Advances in Computers. ,vol. 54, pp. 215- 272 ,(2002) , 10.1016/S0065-2458(01)80019-X
V. V. S. Prakash, Soon Jae Kwon, Raj Mittra, An efficient solution of a dense system of linear equations arising in the method-of-moments formulation Microwave and Optical Technology Letters. ,vol. 33, pp. 196- 200 ,(2002) , 10.1002/MOP.10274
Craig Gentry, Computing arbitrary functions of encrypted data Communications of the ACM. ,vol. 53, pp. 97- 105 ,(2010) , 10.1145/1666420.1666444