Skip to main content

Secure and Efficient Outsourcing of Large-Scale Matrix Inverse Computation

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10874))

Abstract

Matrix inverse computation (MIC) is one of the fundamental mathematical tasks in linear algebra, and finds applications in many areas of science and engineering. In practice, MIC tasks often involve large-scale matrices and impose prohibitive computation costs on resource-constrained users. As cloud computing gains much momentum, a resource-constrained client can choose to outsource the large-scale MIC task to a powerful but untrustworthy cloud. As the input of and the solution to the MIC task usually contain the client’s private information, appropriated mechanisms should be placed for privacy concerns. In this paper, we employ certain matrix transformations and construct an outsourcing scheme known as SEMIC, which can solve the MIC task in a masked yet verifiable manner. Thorough theoretical analysis shows that SEMIC is correct, verifiable, and privacy-preserving. Extensive experimental results demonstrate that SEMIC significantly reduces the computation costs of the client. Compared with the most related work, our solution offers enhanced privacy protection without impairing the efficiency.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Cheung, K.W., So, H.C., Ma, W.-K., Chan, Y.T.: Least squares algorithms for time-of-arrival-based mobile location. IEEE Trans. Signal Process. 52, 1121–1130 (2004)

    Article  MathSciNet  Google Scholar 

  2. Prabhu, H., Rodrigues, J., Edfors, O., Rusek F.: Approximative matrix inverse computations for very-large MIMO and applications to linear pre-coding systems. In: 2013 IEEE Wireless Communications and Networking Conference, WCNC 2013, pp. 2710–2715 (2013)

    Google Scholar 

  3. Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Internet Comput. 16, 69–73 (2012)

    Article  Google Scholar 

  4. Chen, X., Huang, X., Li, J., Ma, J., Lou, W., Wong, D.S.: New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans. Inf. Forensics Secur. 10, 69–78 (2015)

    Article  Google Scholar 

  5. Wang, C., Ren, K., Wang, J., Wang, Q.: Harnessing the cloud for securely outsourcing large-scale systems of linear equations. IEEE Trans. Parallel Distrib. Syst. 24, 1172–1181 (2013)

    Article  Google Scholar 

  6. Salinas, S., Luo, C., Chen, X., Li, P.: Efficient secure outsourcing of large-scale linear systems of equations. In: 2015 IEEE Conference on Computer Communications, INFOCOM 2015, pp. 1035–1043. IEEE (2015)

    Google Scholar 

  7. Pan, S., Zheng, F., Zhu, W.-T., Wang, Q.: Harnessing the cloud for secure and efficient outsourcing of non-negative matrix factorization. In: the 6th IEEE Conference on Communications and Network Security, CNS 2018. IEEE (2018)

    Google Scholar 

  8. Lei, X., Liao, X., Huang, T., Li, H., Hu, C.: Outsourcing large matrix inversion computation to a public cloud. IEEE Trans. Cloud Comput. 1, 78–87 (2013)

    Google Scholar 

  9. Hu, C., Alhothaily, A., Alrawais, A., Cheng, X., Sturtivant, C., Liu, H.: A secure and verifiable outsourcing scheme for matrix inverse computation. In: 2017 IEEE Conference on Computer Communications, INFOCOM 2017, p. 9. IEEE (2017)

    Google Scholar 

  10. Yu, Y., Luo, Y., Wang, D., Fu, S., Xu, M.: Efficient, secure and non-iterative outsourcing of large-scale systems of linear equations. In: 2016 IEEE International Conference on Communications, ICC 2016, p. 6. IEEE (2016)

    Google Scholar 

  11. Strang, G.: Introduction to Linear Algebra. Wellesley-Cambridge Press, Wellesley (2003)

    MATH  Google Scholar 

  12. Strassen, V.: Gaussian elimination is not optimal. Numer. Math. 13, 354–356 (1969)

    Article  MathSciNet  Google Scholar 

  13. Horn, R.A., Johnson, C.R.: Matrix Analysis. Cambridge University Press, Cambridge (2013)

    MATH  Google Scholar 

  14. Motwani, R., Raghavan, P.: Randomized Algorithms. Cambridge University Press, Cambridge (1995)

    Book  Google Scholar 

Download references

Acknowledgment

The authors would like to thank the anonymous reviewers for their valuable comments. This work was partially supported by National Key R&D Program of China under Grant No. 2017YFC0822704 and 2017YFB0802103.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fangyu Zheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pan, S., Wang, Q., Zheng, F., Dong, J. (2018). Secure and Efficient Outsourcing of Large-Scale Matrix Inverse Computation. In: Chellappan, S., Cheng, W., Li, W. (eds) Wireless Algorithms, Systems, and Applications. WASA 2018. Lecture Notes in Computer Science(), vol 10874. Springer, Cham. https://doi.org/10.1007/978-3-319-94268-1_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-94268-1_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-94267-4

  • Online ISBN: 978-3-319-94268-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics