Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming

Cloud computing enables an economically promising paradigm of computation outsourcing. However, how to protect customers confidential data processed and generated during the computation is becoming the major security concern. Focusing on engineering computing and optimization tasks, this paper inves...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on computers Vol. 65; no. 1; pp. 216 - 229
Main Authors: Wang, Cong, Ren, Kui, Wang, Jia
Format: Journal Article
Language:English
Published: IEEE 01.01.2016
Subjects:
ISSN:0018-9340
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Cloud computing enables an economically promising paradigm of computation outsourcing. However, how to protect customers confidential data processed and generated during the computation is becoming the major security concern. Focusing on engineering computing and optimization tasks, this paper investigates secure outsourcing of widely applicable linear programming (LP) computations. Our mechanism design explicitly decomposes LP computation outsourcing into public LP solvers running on the cloud and private LP parameters owned by the customer. The resulting flexibility allows us to explore appropriate security/efficiency tradeoff via higher-level abstraction of LP computation than the general circuit representation. Specifically, by formulating private LP problem as a set of matrices/vectors, we develop efficient privacy-preserving problem transformation techniques, which allow customers to transform the original LP into some random one while protecting sensitive input/output information. To validate the computation result, we further explore the fundamental duality theorem of LP and derive the necessary and sufficient conditions that correct results must satisfy. Such result verification mechanism is very efficient and incurs close-to-zero additional cost on both cloud server and customers. Extensive security analysis and experiment results show the immediate practicability of our mechanism design.
AbstractList Cloud computing enables an economically promising paradigm of computation outsourcing. However, how to protect customers confidential data processed and generated during the computation is becoming the major security concern. Focusing on engineering computing and optimization tasks, this paper investigates secure outsourcing of widely applicable linear programming (LP) computations. Our mechanism design explicitly decomposes LP computation outsourcing into public LP solvers running on the cloud and private LP parameters owned by the customer. The resulting flexibility allows us to explore appropriate security/efficiency tradeoff via higher-level abstraction of LP computation than the general circuit representation. Specifically, by formulating private LP problem as a set of matrices/vectors, we develop efficient privacy-preserving problem transformation techniques, which allow customers to transform the original LP into some random one while protecting sensitive input/output information. To validate the computation result, we further explore the fundamental duality theorem of LP and derive the necessary and sufficient conditions that correct results must satisfy. Such result verification mechanism is very efficient and incurs close-to-zero additional cost on both cloud server and customers. Extensive security analysis and experiment results show the immediate practicability of our mechanism design.
Author Cong Wang
Jia Wang
Kui Ren
Author_xml – sequence: 1
  givenname: Cong
  surname: Wang
  fullname: Wang, Cong
– sequence: 2
  givenname: Kui
  surname: Ren
  fullname: Ren, Kui
– sequence: 3
  givenname: Jia
  surname: Wang
  fullname: Wang, Jia
BookMark eNp9kD1rwzAQhjWk0CTt3KGL_oCT05dtdQumX2BIIelsJFkOKrEVZHlIf30dHDp0KDfccfc-L9y7QLPOdxahBwIrQkCu98WKAhErykkmOJ2hOQDJE8k43KJF338BQEpBzpHeWTMEi7en6Fr3raLzHS58exriNG-H2PshGNcdsBtPRz_UV8G4esIbXKje4l0c6jP2DS5dZ1XAH8EfgmrbUXOHbhp17O39tS_R58vzvnhLyu3re7EpE8NoFhORMwpaNiKtDbGaAFfSKEM0t1RxQiyrU8WB5TSXjTSgdaZIyqCmjRVUaLZEYvI1wfd9sE1l3PREDModKwLVJZxqX1SXcKprOCO3_sOdgmtVOP9DPE6Es9b-qjMYSxD2A07DdBU
CODEN ITCOB4
CitedBy_id crossref_primary_10_1109_TSC_2022_3214615
crossref_primary_10_1109_TCC_2024_3370834
crossref_primary_10_1109_TAC_2024_3495373
crossref_primary_10_1109_TBDATA_2017_2787198
crossref_primary_10_1016_j_suscom_2018_03_002
crossref_primary_10_1109_TIFS_2019_2947872
crossref_primary_10_1108_K_06_2019_0434
crossref_primary_10_1016_j_ins_2020_03_074
crossref_primary_10_1109_JIOT_2018_2867113
crossref_primary_10_1109_TCC_2021_3099720
crossref_primary_10_1145_3637489
crossref_primary_10_1109_TCC_2021_3050012
crossref_primary_10_1109_ACCESS_2019_2915196
crossref_primary_10_1109_COMST_2017_2745201
crossref_primary_10_1007_s11277_021_09176_7
crossref_primary_10_1016_j_ins_2019_05_024
crossref_primary_10_3390_s18061671
crossref_primary_10_1016_j_cose_2022_102740
crossref_primary_10_1007_s11432_017_9208_3
crossref_primary_10_4018_JOEUC_20211101_oa11
crossref_primary_10_1109_TMC_2025_3555322
crossref_primary_10_1016_j_ins_2017_11_063
crossref_primary_10_1108_JWL_12_2018_0156
crossref_primary_10_1145_3403954
crossref_primary_10_1007_s11042_021_11245_9
crossref_primary_10_1016_j_jisa_2019_03_020
crossref_primary_10_4018_IJISP_2018040101
crossref_primary_10_1109_TMC_2021_3110718
crossref_primary_10_1109_ACCESS_2016_2549982
crossref_primary_10_1016_j_jisa_2021_102970
crossref_primary_10_1109_TII_2020_2964563
crossref_primary_10_1016_j_automatica_2018_07_005
crossref_primary_10_1109_TNSM_2025_3565943
crossref_primary_10_1109_TCC_2017_2737980
crossref_primary_10_1016_j_arcontrol_2019_04_010
crossref_primary_10_1016_j_ijcip_2017_10_003
crossref_primary_10_1007_s42979_020_00235_7
crossref_primary_10_1109_TSC_2019_2937484
crossref_primary_10_1007_s11227_018_2274_0
crossref_primary_10_1016_j_simpat_2018_10_006
crossref_primary_10_1109_TBDATA_2017_2711040
crossref_primary_10_1109_TCC_2019_2948012
crossref_primary_10_1145_3611014
crossref_primary_10_1515_itit_2018_0002
crossref_primary_10_1109_ACCESS_2017_2706328
crossref_primary_10_1109_JIOT_2020_2964015
crossref_primary_10_4018_JOEUC_20211101_oa1
crossref_primary_10_1109_TVT_2017_2764332
crossref_primary_10_1145_3158363
crossref_primary_10_1016_j_ins_2018_12_055
crossref_primary_10_1109_TSC_2019_2911282
crossref_primary_10_1109_JSYST_2020_3047673
crossref_primary_10_1007_s13198_021_01068_0
crossref_primary_10_1007_s11704_019_9189_7
crossref_primary_10_1016_j_ins_2023_119870
crossref_primary_10_1016_j_ins_2019_10_007
Cites_doi 10.1109/INFCOM.2011.5935305
10.1145/1755688.1755695
10.1109/TPDS.2011.282
10.1145/28395.28396
10.1145/1655188.1655207
10.1007/s11590-010-0199-5
10.1145/1529282.1529729
10.1109/ICDCS.2004.1281562
10.1109/AINA.2009.133
10.1145/359168.359176
10.1007/s11590-010-0268-9
10.1145/1666420.1666444
10.1007/978-0-387-74503-9
10.1007/BF02165411
10.1007/s10207-005-0070-3
10.1109/INFCOM.2010.5462174
10.1109/PST.2008.12
10.1145/1536414.1536440
10.1007/3-540-48910-X_16
10.1023/A:1024463631728
10.1137/S0036142995281504
10.1145/1374376.1374396
10.1145/508171.508174
10.1109/SECPRI.2003.1199338
10.1017/CBO9780511804441
10.1109/COLCOM.2006.361848
ContentType Journal Article
DBID 97E
RIA
RIE
AAYXX
CITATION
DOI 10.1109/TC.2015.2417542
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE/IET Electronic Library (IEL) (UW System Shared)
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library (IEL) (UW System Shared)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EndPage 229
ExternalDocumentID 10_1109_TC_2015_2417542
7070751
Genre orig-research
GrantInformation_xml – fundername: CityU of Hong Kong
  grantid: 7200320
  funderid: 10.13039/100007567
– fundername: US National Science foundation
  grantid: CNS-1262277; CNS-1116939
  funderid: 10.13039/100000001
– fundername: RGC
  grantid: CityU 138513
  funderid: 10.13039/501100002920
GroupedDBID --Z
-DZ
-~X
.DC
0R~
29I
4.4
5GY
6IK
85S
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACIWK
ACNCT
AENEX
AETEA
AGQYO
AGSQL
AHBIQ
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
IEDLZ
IFIPE
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
RXW
TAE
TN5
TWZ
UHB
UPT
XZL
YZZ
AAYXX
ABUFD
CITATION
ID FETCH-LOGICAL-c327t-58320b9f56dc1eb104a9cac1b4e2a411e3d6a4038289f9c0bb7a1630d2fe525b3
IEDL.DBID RIE
ISICitedReferencesCount 66
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000366419400018&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0018-9340
IngestDate Sat Nov 29 01:35:37 EST 2025
Tue Nov 18 20:52:09 EST 2025
Wed Aug 27 02:49:02 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords computation outsourcing
linear programming
cloud computing
optimization
Confidential data
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c327t-58320b9f56dc1eb104a9cac1b4e2a411e3d6a4038289f9c0bb7a1630d2fe525b3
PageCount 14
ParticipantIDs ieee_primary_7070751
crossref_citationtrail_10_1109_TC_2015_2417542
crossref_primary_10_1109_TC_2015_2417542
PublicationCentury 2000
PublicationDate 2016-Jan.-1
2016-1-1
PublicationDateYYYYMMDD 2016-01-01
PublicationDate_xml – month: 01
  year: 2016
  text: 2016-Jan.-1
  day: 01
PublicationDecade 2010
PublicationTitle IEEE transactions on computers
PublicationTitleAbbrev TC
PublicationYear 2016
Publisher IEEE
Publisher_xml – name: IEEE
References ref34
ref12
ref37
ref15
ref36
ref14
ref31
ref30
gennaro (ref9) 0
ref32
ref10
toft (ref26) 0
ref1
luenberger (ref13) 2008
catrina (ref28) 0
ref16
ref19
ref18
(ref3) 0
l (ref33) 2012; 6
ref24
ref23
cormen (ref17) 2008
ref25
ref20
ref22
ref21
atallah (ref5) 2001; 54
yao (ref11) 0
ref27
du (ref29) 2001
ref8
ref7
ref4
hohenberger (ref6) 0
golle (ref35) 0
mell (ref2) 2011
References_xml – year: 2008
  ident: ref17
  publication-title: Introduction to Algorithms
– ident: ref1
  doi: 10.1109/INFCOM.2011.5935305
– start-page: 465
  year: 0
  ident: ref9
  article-title: Non-interactive verifiable computing: Outsourcing computation to untrusted workers
  publication-title: Proc 30th Annu Conf Adv Cryptol
– ident: ref10
  doi: 10.1145/1755688.1755695
– ident: ref14
  doi: 10.1109/TPDS.2011.282
– ident: ref21
  doi: 10.1145/28395.28396
– ident: ref31
  doi: 10.1145/1655188.1655207
– ident: ref32
  doi: 10.1007/s11590-010-0199-5
– ident: ref30
  doi: 10.1145/1529282.1529729
– ident: ref37
  doi: 10.1109/ICDCS.2004.1281562
– ident: ref27
  doi: 10.1109/AINA.2009.133
– volume: 54
  start-page: 216
  year: 2001
  ident: ref5
  article-title: Secure outsourcing of scientific computations
  publication-title: Adv Comput
– ident: ref23
  doi: 10.1145/359168.359176
– volume: 6
  start-page: 431
  year: 2012
  ident: ref33
  article-title: Privacy-preserving horizontally partitioned linear programs
  publication-title: Optim Lett
  doi: 10.1007/s11590-010-0268-9
– ident: ref4
  doi: 10.1145/1666420.1666444
– year: 0
  ident: ref3
– start-page: 134
  year: 0
  ident: ref28
  article-title: Secure multiparty linear programming using fixed-point arithmetic
  publication-title: Proc Eur Conf Res Comput Security
– year: 2008
  ident: ref13
  publication-title: Linear and Nonlinear Programming
  doi: 10.1007/978-0-387-74503-9
– start-page: 264
  year: 0
  ident: ref6
  article-title: How to securely outsource cryptographic computations
  publication-title: Proc 2nd Theory Cryptography Conf
– ident: ref20
  doi: 10.1007/BF02165411
– ident: ref7
  doi: 10.1007/s10207-005-0070-3
– ident: ref15
  doi: 10.1109/INFCOM.2010.5462174
– start-page: 90
  year: 0
  ident: ref26
  article-title: Solving linear programs using multiparty computation
  publication-title: Proc Int'l Conf Financial Cryptography and Data Security
– ident: ref8
  doi: 10.1109/PST.2008.12
– start-page: 425
  year: 0
  ident: ref35
  article-title: Uncheatable distributed computations
  publication-title: Proc Cryptographers' Track RSA Conf Topics Cryptology
– ident: ref12
  doi: 10.1145/1536414.1536440
– ident: ref22
  doi: 10.1007/3-540-48910-X_16
– ident: ref18
  doi: 10.1023/A:1024463631728
– year: 2011
  ident: ref2
– year: 2001
  ident: ref29
  article-title: A study of several specific secure two-party computation problems
– start-page: 160
  year: 0
  ident: ref11
  article-title: Protocols for secure computations (extended abstract)
  publication-title: Proc 23rd Annu Symp Found Comput Sci
– ident: ref19
  doi: 10.1137/S0036142995281504
– ident: ref34
  doi: 10.1145/1374376.1374396
– ident: ref24
  doi: 10.1145/508171.508174
– ident: ref36
  doi: 10.1109/SECPRI.2003.1199338
– ident: ref16
  doi: 10.1017/CBO9780511804441
– ident: ref25
  doi: 10.1109/COLCOM.2006.361848
SSID ssj0006209
Score 2.4644446
Snippet Cloud computing enables an economically promising paradigm of computation outsourcing. However, how to protect customers confidential data processed and...
SourceID crossref
ieee
SourceType Enrichment Source
Index Database
Publisher
StartPage 216
SubjectTerms cloud computing
computation outsourcing
Computational modeling
Confidential data
Cryptography
Linear programming
optimization
Outsourcing
Servers
Vectors
Title Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
URI https://ieeexplore.ieee.org/document/7070751
Volume 65
WOSCitedRecordID wos000366419400018&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE/IET Electronic Library (IEL) (UW System Shared)
  issn: 0018-9340
  databaseCode: RIE
  dateStart: 19680101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://ieeexplore.ieee.org/
  omitProxy: false
  ssIdentifier: ssj0006209
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDI7GxAEODDYQ46UcOHCgW9qkj3CbKiZO2w5D2q1qWkeaNDY0WiT-PU6bVUOCA7cotauqru3Ytf0Rcs-ARcoPwOFmcCtaP-7gIVY4TOsoDyOmQaoKbCKcTKLFQs5a5LHphQGAqvgMBmZZ_cvPN1lpUmXD0MymMf3SB2EY1L1ajdUNduUcLiowF8yO8XGZHM5jU8LlD9BZGbzXHx5oD1Kl8ijjzv-e5ZSc2JMjHdWiPiMtWHdJZ4fKQK2Sdsnx3ojBHlFVQh3oFE3Dm-25pDVTvZ6WRZXAR2q6xEurTZlbAtx6oiMao6Ojpt7wi240xeAVlYPO6rquN6Q5J6_j53n84lhcBSfjXliYRiuPKan9IM9ctNVMpDJLM1cJ8FLhusDzIBWMm2BMy4wpFaZ4bGO5p8H3fMUvSHu9WcMloSrlIchAgoiUkDkqtwKRa7w9BpZKpn0y2L3rJLNDxw32xSqpgg8mk3mcGOEkVjh98tAwvNfzNv4m7RmxNGRWIle_b1-TI2S22ZMb0i62JdySw-yzWH5s76pv6RtNX8bj
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLYmQAIODDYQ45kDBw50S9v0EW7TxDTE2HYY0m5V07rSpD3Q2JD49zhtNg0JDtyi1ImqurZjx_4McMeRh8rz0XI1cCtpP9eiQ6yweJaFaRDyDKXKm00EvV44GslBCR42tTCImCefYV0P87v8dJ6sdKisEWhsGl0vvesJ8nuKaq2N3vXXCR02ibAruAHysblsDFs6icurk7nSHV9_2KCtpiq5TWmX__c2x3Bkzo6sWTD7BEo4q0B53ZeBGTGtwOEWyGAVVB5SR9Yn5TA1VZesWFSM-6tlHsInajamR5P5KjUENPXImqxFpo7pjMMvNs8Yua8kHmxQZHZNieYU3tpPw1bHMp0VrMR1gqUutXK4kpnnp4lN2pqLWCZxYiuBTixsG93UjwV3tTuWyYQrFcR0cOOpk6HneMo9g53ZfIbnwFTsBih9iSJUQqYk3gpFmtH25FoqGdegvv7WUWJgx3X3i0mUux9cRsNWpJkTGebU4H6z4L1A3PibtKrZsiEzHLn4ffoW9jvD127Ufe69XMIBbWRiKVews1ys8Br2ks_l-GNxk_9X38-Hyio
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+Optimization+Computation+Outsourcing+in+Cloud+Computing%3A+A+Case+Study+of+Linear+Programming&rft.jtitle=IEEE+transactions+on+computers&rft.au=Wang%2C+Cong&rft.au=Ren%2C+Kui&rft.au=Wang%2C+Jia&rft.date=2016-01-01&rft.issn=0018-9340&rft.volume=65&rft.issue=1&rft.spage=216&rft.epage=229&rft_id=info:doi/10.1109%2FTC.2015.2417542&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TC_2015_2417542
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9340&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9340&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9340&client=summon