Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming
Cloud computing enables an economically promising paradigm of computation outsourcing. However, how to protect customers confidential data processed and generated during the computation is becoming the major security concern. Focusing on engineering computing and optimization tasks, this paper inves...
Saved in:
| Published in: | IEEE transactions on computers Vol. 65; no. 1; pp. 216 - 229 |
|---|---|
| Main Authors: | , , |
| Format: | Journal Article |
| Language: | English |
| Published: |
IEEE
01.01.2016
|
| Subjects: | |
| ISSN: | 0018-9340 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Cloud computing enables an economically promising paradigm of computation outsourcing. However, how to protect customers confidential data processed and generated during the computation is becoming the major security concern. Focusing on engineering computing and optimization tasks, this paper investigates secure outsourcing of widely applicable linear programming (LP) computations. Our mechanism design explicitly decomposes LP computation outsourcing into public LP solvers running on the cloud and private LP parameters owned by the customer. The resulting flexibility allows us to explore appropriate security/efficiency tradeoff via higher-level abstraction of LP computation than the general circuit representation. Specifically, by formulating private LP problem as a set of matrices/vectors, we develop efficient privacy-preserving problem transformation techniques, which allow customers to transform the original LP into some random one while protecting sensitive input/output information. To validate the computation result, we further explore the fundamental duality theorem of LP and derive the necessary and sufficient conditions that correct results must satisfy. Such result verification mechanism is very efficient and incurs close-to-zero additional cost on both cloud server and customers. Extensive security analysis and experiment results show the immediate practicability of our mechanism design. |
|---|---|
| AbstractList | Cloud computing enables an economically promising paradigm of computation outsourcing. However, how to protect customers confidential data processed and generated during the computation is becoming the major security concern. Focusing on engineering computing and optimization tasks, this paper investigates secure outsourcing of widely applicable linear programming (LP) computations. Our mechanism design explicitly decomposes LP computation outsourcing into public LP solvers running on the cloud and private LP parameters owned by the customer. The resulting flexibility allows us to explore appropriate security/efficiency tradeoff via higher-level abstraction of LP computation than the general circuit representation. Specifically, by formulating private LP problem as a set of matrices/vectors, we develop efficient privacy-preserving problem transformation techniques, which allow customers to transform the original LP into some random one while protecting sensitive input/output information. To validate the computation result, we further explore the fundamental duality theorem of LP and derive the necessary and sufficient conditions that correct results must satisfy. Such result verification mechanism is very efficient and incurs close-to-zero additional cost on both cloud server and customers. Extensive security analysis and experiment results show the immediate practicability of our mechanism design. |
| Author | Cong Wang Jia Wang Kui Ren |
| Author_xml | – sequence: 1 givenname: Cong surname: Wang fullname: Wang, Cong – sequence: 2 givenname: Kui surname: Ren fullname: Ren, Kui – sequence: 3 givenname: Jia surname: Wang fullname: Wang, Jia |
| BookMark | eNp9kD1rwzAQhjWk0CTt3KGL_oCT05dtdQumX2BIIelsJFkOKrEVZHlIf30dHDp0KDfccfc-L9y7QLPOdxahBwIrQkCu98WKAhErykkmOJ2hOQDJE8k43KJF338BQEpBzpHeWTMEi7en6Fr3raLzHS58exriNG-H2PshGNcdsBtPRz_UV8G4esIbXKje4l0c6jP2DS5dZ1XAH8EfgmrbUXOHbhp17O39tS_R58vzvnhLyu3re7EpE8NoFhORMwpaNiKtDbGaAFfSKEM0t1RxQiyrU8WB5TSXjTSgdaZIyqCmjRVUaLZEYvI1wfd9sE1l3PREDModKwLVJZxqX1SXcKprOCO3_sOdgmtVOP9DPE6Es9b-qjMYSxD2A07DdBU |
| CODEN | ITCOB4 |
| CitedBy_id | crossref_primary_10_1109_TSC_2022_3214615 crossref_primary_10_1109_TCC_2024_3370834 crossref_primary_10_1109_TAC_2024_3495373 crossref_primary_10_1109_TBDATA_2017_2787198 crossref_primary_10_1016_j_suscom_2018_03_002 crossref_primary_10_1109_TIFS_2019_2947872 crossref_primary_10_1108_K_06_2019_0434 crossref_primary_10_1016_j_ins_2020_03_074 crossref_primary_10_1109_JIOT_2018_2867113 crossref_primary_10_1109_TCC_2021_3099720 crossref_primary_10_1145_3637489 crossref_primary_10_1109_TCC_2021_3050012 crossref_primary_10_1109_ACCESS_2019_2915196 crossref_primary_10_1109_COMST_2017_2745201 crossref_primary_10_1007_s11277_021_09176_7 crossref_primary_10_1016_j_ins_2019_05_024 crossref_primary_10_3390_s18061671 crossref_primary_10_1016_j_cose_2022_102740 crossref_primary_10_1007_s11432_017_9208_3 crossref_primary_10_4018_JOEUC_20211101_oa11 crossref_primary_10_1109_TMC_2025_3555322 crossref_primary_10_1016_j_ins_2017_11_063 crossref_primary_10_1108_JWL_12_2018_0156 crossref_primary_10_1145_3403954 crossref_primary_10_1007_s11042_021_11245_9 crossref_primary_10_1016_j_jisa_2019_03_020 crossref_primary_10_4018_IJISP_2018040101 crossref_primary_10_1109_TMC_2021_3110718 crossref_primary_10_1109_ACCESS_2016_2549982 crossref_primary_10_1016_j_jisa_2021_102970 crossref_primary_10_1109_TII_2020_2964563 crossref_primary_10_1016_j_automatica_2018_07_005 crossref_primary_10_1109_TNSM_2025_3565943 crossref_primary_10_1109_TCC_2017_2737980 crossref_primary_10_1016_j_arcontrol_2019_04_010 crossref_primary_10_1016_j_ijcip_2017_10_003 crossref_primary_10_1007_s42979_020_00235_7 crossref_primary_10_1109_TSC_2019_2937484 crossref_primary_10_1007_s11227_018_2274_0 crossref_primary_10_1016_j_simpat_2018_10_006 crossref_primary_10_1109_TBDATA_2017_2711040 crossref_primary_10_1109_TCC_2019_2948012 crossref_primary_10_1145_3611014 crossref_primary_10_1515_itit_2018_0002 crossref_primary_10_1109_ACCESS_2017_2706328 crossref_primary_10_1109_JIOT_2020_2964015 crossref_primary_10_4018_JOEUC_20211101_oa1 crossref_primary_10_1109_TVT_2017_2764332 crossref_primary_10_1145_3158363 crossref_primary_10_1016_j_ins_2018_12_055 crossref_primary_10_1109_TSC_2019_2911282 crossref_primary_10_1109_JSYST_2020_3047673 crossref_primary_10_1007_s13198_021_01068_0 crossref_primary_10_1007_s11704_019_9189_7 crossref_primary_10_1016_j_ins_2023_119870 crossref_primary_10_1016_j_ins_2019_10_007 |
| Cites_doi | 10.1109/INFCOM.2011.5935305 10.1145/1755688.1755695 10.1109/TPDS.2011.282 10.1145/28395.28396 10.1145/1655188.1655207 10.1007/s11590-010-0199-5 10.1145/1529282.1529729 10.1109/ICDCS.2004.1281562 10.1109/AINA.2009.133 10.1145/359168.359176 10.1007/s11590-010-0268-9 10.1145/1666420.1666444 10.1007/978-0-387-74503-9 10.1007/BF02165411 10.1007/s10207-005-0070-3 10.1109/INFCOM.2010.5462174 10.1109/PST.2008.12 10.1145/1536414.1536440 10.1007/3-540-48910-X_16 10.1023/A:1024463631728 10.1137/S0036142995281504 10.1145/1374376.1374396 10.1145/508171.508174 10.1109/SECPRI.2003.1199338 10.1017/CBO9780511804441 10.1109/COLCOM.2006.361848 |
| ContentType | Journal Article |
| DBID | 97E RIA RIE AAYXX CITATION |
| DOI | 10.1109/TC.2015.2417542 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE/IET Electronic Library (IEL) (UW System Shared) CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library (IEL) (UW System Shared) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EndPage | 229 |
| ExternalDocumentID | 10_1109_TC_2015_2417542 7070751 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: CityU of Hong Kong grantid: 7200320 funderid: 10.13039/100007567 – fundername: US National Science foundation grantid: CNS-1262277; CNS-1116939 funderid: 10.13039/100000001 – fundername: RGC grantid: CityU 138513 funderid: 10.13039/501100002920 |
| GroupedDBID | --Z -DZ -~X .DC 0R~ 29I 4.4 5GY 6IK 85S 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACIWK ACNCT AENEX AETEA AGQYO AGSQL AHBIQ AKQYR ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ IEDLZ IFIPE IPLJI JAVBF LAI M43 MS~ O9- OCL P2P PQQKQ RIA RIE RNS RXW TAE TN5 TWZ UHB UPT XZL YZZ AAYXX ABUFD CITATION |
| ID | FETCH-LOGICAL-c327t-58320b9f56dc1eb104a9cac1b4e2a411e3d6a4038289f9c0bb7a1630d2fe525b3 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 66 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000366419400018&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0018-9340 |
| IngestDate | Sat Nov 29 01:35:37 EST 2025 Tue Nov 18 20:52:09 EST 2025 Wed Aug 27 02:49:02 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Keywords | computation outsourcing linear programming cloud computing optimization Confidential data |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c327t-58320b9f56dc1eb104a9cac1b4e2a411e3d6a4038289f9c0bb7a1630d2fe525b3 |
| PageCount | 14 |
| ParticipantIDs | ieee_primary_7070751 crossref_citationtrail_10_1109_TC_2015_2417542 crossref_primary_10_1109_TC_2015_2417542 |
| PublicationCentury | 2000 |
| PublicationDate | 2016-Jan.-1 2016-1-1 |
| PublicationDateYYYYMMDD | 2016-01-01 |
| PublicationDate_xml | – month: 01 year: 2016 text: 2016-Jan.-1 day: 01 |
| PublicationDecade | 2010 |
| PublicationTitle | IEEE transactions on computers |
| PublicationTitleAbbrev | TC |
| PublicationYear | 2016 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| References | ref34 ref12 ref37 ref15 ref36 ref14 ref31 ref30 gennaro (ref9) 0 ref32 ref10 toft (ref26) 0 ref1 luenberger (ref13) 2008 catrina (ref28) 0 ref16 ref19 ref18 (ref3) 0 l (ref33) 2012; 6 ref24 ref23 cormen (ref17) 2008 ref25 ref20 ref22 ref21 atallah (ref5) 2001; 54 yao (ref11) 0 ref27 du (ref29) 2001 ref8 ref7 ref4 hohenberger (ref6) 0 golle (ref35) 0 mell (ref2) 2011 |
| References_xml | – year: 2008 ident: ref17 publication-title: Introduction to Algorithms – ident: ref1 doi: 10.1109/INFCOM.2011.5935305 – start-page: 465 year: 0 ident: ref9 article-title: Non-interactive verifiable computing: Outsourcing computation to untrusted workers publication-title: Proc 30th Annu Conf Adv Cryptol – ident: ref10 doi: 10.1145/1755688.1755695 – ident: ref14 doi: 10.1109/TPDS.2011.282 – ident: ref21 doi: 10.1145/28395.28396 – ident: ref31 doi: 10.1145/1655188.1655207 – ident: ref32 doi: 10.1007/s11590-010-0199-5 – ident: ref30 doi: 10.1145/1529282.1529729 – ident: ref37 doi: 10.1109/ICDCS.2004.1281562 – ident: ref27 doi: 10.1109/AINA.2009.133 – volume: 54 start-page: 216 year: 2001 ident: ref5 article-title: Secure outsourcing of scientific computations publication-title: Adv Comput – ident: ref23 doi: 10.1145/359168.359176 – volume: 6 start-page: 431 year: 2012 ident: ref33 article-title: Privacy-preserving horizontally partitioned linear programs publication-title: Optim Lett doi: 10.1007/s11590-010-0268-9 – ident: ref4 doi: 10.1145/1666420.1666444 – year: 0 ident: ref3 – start-page: 134 year: 0 ident: ref28 article-title: Secure multiparty linear programming using fixed-point arithmetic publication-title: Proc Eur Conf Res Comput Security – year: 2008 ident: ref13 publication-title: Linear and Nonlinear Programming doi: 10.1007/978-0-387-74503-9 – start-page: 264 year: 0 ident: ref6 article-title: How to securely outsource cryptographic computations publication-title: Proc 2nd Theory Cryptography Conf – ident: ref20 doi: 10.1007/BF02165411 – ident: ref7 doi: 10.1007/s10207-005-0070-3 – ident: ref15 doi: 10.1109/INFCOM.2010.5462174 – start-page: 90 year: 0 ident: ref26 article-title: Solving linear programs using multiparty computation publication-title: Proc Int'l Conf Financial Cryptography and Data Security – ident: ref8 doi: 10.1109/PST.2008.12 – start-page: 425 year: 0 ident: ref35 article-title: Uncheatable distributed computations publication-title: Proc Cryptographers' Track RSA Conf Topics Cryptology – ident: ref12 doi: 10.1145/1536414.1536440 – ident: ref22 doi: 10.1007/3-540-48910-X_16 – ident: ref18 doi: 10.1023/A:1024463631728 – year: 2011 ident: ref2 – year: 2001 ident: ref29 article-title: A study of several specific secure two-party computation problems – start-page: 160 year: 0 ident: ref11 article-title: Protocols for secure computations (extended abstract) publication-title: Proc 23rd Annu Symp Found Comput Sci – ident: ref19 doi: 10.1137/S0036142995281504 – ident: ref34 doi: 10.1145/1374376.1374396 – ident: ref24 doi: 10.1145/508171.508174 – ident: ref36 doi: 10.1109/SECPRI.2003.1199338 – ident: ref16 doi: 10.1017/CBO9780511804441 – ident: ref25 doi: 10.1109/COLCOM.2006.361848 |
| SSID | ssj0006209 |
| Score | 2.4644446 |
| Snippet | Cloud computing enables an economically promising paradigm of computation outsourcing. However, how to protect customers confidential data processed and... |
| SourceID | crossref ieee |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 216 |
| SubjectTerms | cloud computing computation outsourcing Computational modeling Confidential data Cryptography Linear programming optimization Outsourcing Servers Vectors |
| Title | Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming |
| URI | https://ieeexplore.ieee.org/document/7070751 |
| Volume | 65 |
| WOSCitedRecordID | wos000366419400018&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE/IET Electronic Library (IEL) (UW System Shared) issn: 0018-9340 databaseCode: RIE dateStart: 19680101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://ieeexplore.ieee.org/ omitProxy: false ssIdentifier: ssj0006209 providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDI7GxAEODDYQ46UcOHCgW9qkj3CbKiZO2w5D2q1qWkeaNDY0WiT-PU6bVUOCA7cotauqru3Ytf0Rcs-ARcoPwOFmcCtaP-7gIVY4TOsoDyOmQaoKbCKcTKLFQs5a5LHphQGAqvgMBmZZ_cvPN1lpUmXD0MymMf3SB2EY1L1ajdUNduUcLiowF8yO8XGZHM5jU8LlD9BZGbzXHx5oD1Kl8ijjzv-e5ZSc2JMjHdWiPiMtWHdJZ4fKQK2Sdsnx3ojBHlFVQh3oFE3Dm-25pDVTvZ6WRZXAR2q6xEurTZlbAtx6oiMao6Ojpt7wi240xeAVlYPO6rquN6Q5J6_j53n84lhcBSfjXliYRiuPKan9IM9ctNVMpDJLM1cJ8FLhusDzIBWMm2BMy4wpFaZ4bGO5p8H3fMUvSHu9WcMloSrlIchAgoiUkDkqtwKRa7w9BpZKpn0y2L3rJLNDxw32xSqpgg8mk3mcGOEkVjh98tAwvNfzNv4m7RmxNGRWIle_b1-TI2S22ZMb0i62JdySw-yzWH5s76pv6RtNX8bj |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLYmQAIODDYQ45kDBw50S9v0EW7TxDTE2HYY0m5V07rSpD3Q2JD49zhtNg0JDtyi1ImqurZjx_4McMeRh8rz0XI1cCtpP9eiQ6yweJaFaRDyDKXKm00EvV44GslBCR42tTCImCefYV0P87v8dJ6sdKisEWhsGl0vvesJ8nuKaq2N3vXXCR02ibAruAHysblsDFs6icurk7nSHV9_2KCtpiq5TWmX__c2x3Bkzo6sWTD7BEo4q0B53ZeBGTGtwOEWyGAVVB5SR9Yn5TA1VZesWFSM-6tlHsInajamR5P5KjUENPXImqxFpo7pjMMvNs8Yua8kHmxQZHZNieYU3tpPw1bHMp0VrMR1gqUutXK4kpnnp4lN2pqLWCZxYiuBTixsG93UjwV3tTuWyYQrFcR0cOOpk6HneMo9g53ZfIbnwFTsBih9iSJUQqYk3gpFmtH25FoqGdegvv7WUWJgx3X3i0mUux9cRsNWpJkTGebU4H6z4L1A3PibtKrZsiEzHLn4ffoW9jvD127Ufe69XMIBbWRiKVews1ys8Br2ks_l-GNxk_9X38-Hyio |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+Optimization+Computation+Outsourcing+in+Cloud+Computing%3A+A+Case+Study+of+Linear+Programming&rft.jtitle=IEEE+transactions+on+computers&rft.au=Wang%2C+Cong&rft.au=Ren%2C+Kui&rft.au=Wang%2C+Jia&rft.date=2016-01-01&rft.issn=0018-9340&rft.volume=65&rft.issue=1&rft.spage=216&rft.epage=229&rft_id=info:doi/10.1109%2FTC.2015.2417542&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TC_2015_2417542 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9340&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9340&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9340&client=summon |