학술논문

Efficient Secure Outsourcing of Large-Scale Convex Separable Programming for Big Data
Document Type
Periodical
Source
IEEE Transactions on Big Data IEEE Trans. Big Data Big Data, IEEE Transactions on. 5(3):368-378 Sep, 2019
Subject
Computing and Processing
Cloud computing
Outsourcing
Companies
Big Data
Programming
Encryption
Convex separable programming
cloud computing
data security and privacy
big data
Language
ISSN
2332-7790
2372-2096
Abstract
Big data has become a key basis of innovation and intelligence, potentially making our lives more convenient and bringing new opportunities to the modern society. Towards this goal, a critical underlying task is to solve a series of large-scale fundamental problems. Conducting such large-scale data analytics in a timely manner requires a large amount of computing resources, which may not be available for individuals and small companies in practice. By outsourcing their computations to the cloud, clients can solve such problems in a cost-effective way. However, confidential data stored at the cloud is vulnerable to cyber attacks, and thus needs to be protected. Previous works employ cryptographic techniques like homomorphic encryption, which significantly increase the computational complexity of solving a large-scale problem at the cloud and is impractical for big data applications. For the first time in the literature, we present an efficient secure outsourcing scheme for convex separable programming problems (CSPs). In particular, we first develop efficient matrix and vector transformation schemes only based on arithmetic operations that are computationally indistinguishable both in value and in structure under a chosen-plaintext attack (CPA). Then, we design a secure outsourcing scheme in which the client and the cloud collaboratively solve the transformed problems. The client can efficiently verify the correctness of returned results to prevent any malicious behavior of the cloud. Theoretical correctness and privacy analysis together show that the proposed scheme obtains optimal results and that the cloud cannot learn private information from the client's concealed data. We conduct extensive simulations on Amazon Elastic Cloud Computing (EC2) platform and find that our proposed scheme provides significant time savings to the clients.