Processing math: 100%
Secure and Verifiable Outsourcing of Large-Scale Nonnegative Matrix Factorization (NMF) | IEEE Journals & Magazine | IEEE Xplore

Secure and Verifiable Outsourcing of Large-Scale Nonnegative Matrix Factorization (NMF)


Abstract:

Nowadays, cloud computing platforms are becoming increasingly prevalent and readily available, providing alternative and economic services for resource-constrained client...Show More

Abstract:

Nowadays, cloud computing platforms are becoming increasingly prevalent and readily available, providing alternative and economic services for resource-constrained clients to perform large-scale computations. This work addresses the problem of secure outsourcing of large-scale nonnegative matrix factorization (NMF) to a cloud in a way that the client can verify the correctness of the results with small overhead. The protection of the input matrix is achieved by a random permutation and scaling encryption mechanism. By exploiting the iterative nature of NMF computation, we propose a single-round verification strategy, which can be proved to be quite effective. Theoretical and experimental results are provided to show the superior performance of the proposed scheme.
Published in: IEEE Transactions on Services Computing ( Volume: 14, Issue: 6, 01 Nov.-Dec. 2021)
Page(s): 1940 - 1953
Date of Publication: 14 April 2019

ISSN Information:

Funding Agency:

References is not available for this document.

1 Introduction

In the big data era, quintillion bytes of data are being created daily at an astounding speed. These data are generated from almost everywhere: digital images and videos, purchase transaction records, cell phone GPS signals, sensors for gathering climate information, posts on social media networks, just to name a few. To become competitive, organizations need to efficiently convert the large amount of raw data into significant insights, guiding their strategies for investment, marketing, research, etc.

Select All
1.
D. El Badawy, N. Q. K. Duong and A. Ozerov, "On-the-fly audio source separation", Proc. IEEE Int. Workshop Mach. Learn. Signal Process., pp. 1-6, 2014.
2.
F. Shahnaz, M. W. Berry, V. P. Pauca and R. J. Plemmons, "Document clustering using nonnegative matrix factorization", J. Inf. Process. Manag., vol. 42, no. 2, pp. 373-386, 2006.
3.
W. Xu, X. Liu and Y. Gong, "Document clustering based on non-negative matrix factorization", Proc. Int. ACM SIGIR Conf. Res. Develop. Inf. Retrieval, pp. 267-273, 2003.
4.
H. Lee, A. Cichocki and S. Choi, "Kernel nonnegative matrix factorization for spectral eeg feature extraction", Neurocomputing, vol. 72, no. 13, pp. 3182-3190, 2009.
5.
Z. Yuan and E. Oja, "Projective nonnegative matrix factorization for image compression and feature extraction", Proc. 14th Scandinavian Conf. Image Anal., pp. 333-342, 2005.
6.
L.-J. Zhang, "Editorial: Big services era: Global trends of cloud computing and big data", IEEE Trans. Serv. Comput., vol. 5, no. 4, pp. 467-468, Oct.-Dec. 2012.
7.
G. Brunette and R. Mogull, "Security guidance for critical areas of focus in cloud computing v2. 1", Cloud Security Alliance, pp. 1-76, 2009.
8.
B. Wang, B. Li and H. Li, "Oruta: Privacy-preserving public auditing for shared data in the cloud", IEEE Trans. Cloud Comput., vol. 2, no. 1, pp. 43-56, Jan.-Mar. 2014.
9.
R. Gennaro, C. Gentry and B. Parno, "Non-interactive verifiable computing: Outsourcing computation to untrusted workers", Proc. Ann. Conf. Advances Cryptology, pp. 465-482, 2010.
10.
K.-M. Chung, Y. Kalai and S. Vadhan, "Improved delegation of computation using fully homomorphic encryption", Proc. Ann. Conf. Advances Cryptology, pp. 483-501, 2010.
11.
C. Gentry, "Fully homomorphic encryption using ideal lattices", Proc. 41st Annu. ACM Symp. Theory Comput., pp. 169-178, 2009.
12.
Z. Qin, J. Yan, K. Ren, C. W. Chen, C. Wang and X. Fu, "Privacy-preserving outsourcing of image global feature detection", Proc. IEEE Global Commun. Conf., pp. 710-715, 2014.
13.
Y. Ishimaki, H. Imabayashi, K. Shimizu and H. Yamana, "Privacy-preserving string search for genome sequences with FHE bootstrapping optimization", Proc. Int. Conf. Big Data, pp. 3989-3991, 2016.
14.
X. Liu, R. H. Deng, K.-K. Choo and J. Weng, "An efficient privacy-preserving outsourced calculation toolkit with multiple keys", IEEE Trans. Inf. Forensics Security, vol. 11, no. 11, pp. 2401-2414, Nov. 2016.
15.
S. Hohenberger and A. Lysyanskaya, "How to securely outsource cryptographic computations", Proc. 2nd Int. Conf. Theory Cryptography, pp. 264-282, 2005.
16.
X. Chen, J. Li, J. Ma, Q. Tang and W. Lou, "New algorithms for secure outsourcing of modular exponentiations", IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 9, pp. 2386-2396, Sep. 2014.
17.
C. Wang, K. Ren, J. Wang and K. M. R. Urs, "Harnessing the cloud for securely solving large-scale systems of linear equations", IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1172-1181, Jun. 2013.
18.
X. Chen, X. Huang, J. Li, J. Ma, W. Lou and D. Wong, "New algorithms for secure outsourcing of large-scale systems of linear equations", IEEE Trans. Inf. Forensics Security, vol. 10, no. 1, pp. 69-78, Jan. 2015.
19.
F. Chen, T. Xiang, X. Lei and J. Chen, "Highly efficient linear regression outsourcing to a cloud", IEEE Trans. Cloud Comput., vol. 2, no. 4, pp. 499-508, Oct.-Dec. 2014.
20.
Z. Xu, C. Wang, K. Ren, L. Wang and B. Zhang, "Proof-carrying cloud computation: The case of convex optimization", IEEE Trans. Inf. Forensics Security, vol. 9, no. 11, pp. 1790-1803, Nov. 2014.
21.
C. Wang, K. Ren and J. Wang, "Secure and practical outsourcing of linear programming in cloud computing", Proc. IEEE Int. Conf. Comput. Commun., pp. 820-828, 2011.
22.
C. Wang, K. Ren and J. Wang, "Secure optimization computation outsourcing in cloud computing: A case study of linear programming", IEEE Trans. Comput., vol. 65, no. 1, pp. 216-229, Jan. 2016.
23.
M. Blanton, Y. Zhang and K. B. Frikken, "Secure and verifiable outsourcing of large-scale biometric computations", ACM Trans. Inf. Syst. Security, vol. 16, no. 3, pp. 1-33, 2013.
24.
M. J. Atallah and J. Li, "Secure outsourcing of sequence comparisons", Int. J. Inf. Security, vol. 4, no. 4, pp. 277-287, 2005.
25.
M. Blanton, M. J. Atallah, K. B. Frikken and Q. Malluhi, "Secure and efficient outsourcing of sequence comparisons", Proc. 17th Eur. Symp. Res. Comput. Security, pp. 505-522, 2012.
26.
C. Wang, N. Cao, K. Ren and W. Lou, "Enabling secure and efficient ranked keyword search over outsourced cloud data", IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 8, pp. 1467-1479, Aug. 2012.
27.
Z. Fu, F. Huang, K. Ren, J. Weng and C. Wang, "Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data", IEEE Trans. Inf. Forensics Security, vol. 12, no. 8, pp. 1874-1884, Aug. 2017.
28.
C. Wang, B. Zhang, K. Ren and J. M. Roveda, "Privacy-assured outsourcing of image reconstruction service in cloud", IEEE Trans. Emerging Topics Comput., vol. 1, no. 1, pp. 166-177, Jun. 2013.
29.
Z. Qin, J. Yan, K. Ren, C. W. Chen and C. Wang, "Towards efficient privacy-preserving image feature extraction in cloud computing", Proc. 22nd ACM Int. Conf. Multimedia, pp. 497-506, 2014.
30.
D. Fiore and R. Gennaro, "Publicly verifiable delegation of large polynomials and matrix computations with applications", Proc. ACM Conf. Comput. Commun. Security, pp. 501-512, 2012.
Contact IEEE to Subscribe

References

References is not available for this document.