Secure Data Computation Outsourcing in Cloud

A fundamental concern to move computational workloads from private resources to the cloud is the protection of the confidential data that the computation consumes and produces. Thus, secure computation outsourcing services are in great need to not only protect sensitive workload information but validate the integrity of the computation result. This is, however, a very difficult task due to a number of challenges that have to be met simultaneously. Firstly, such a service has to be practically feasible (immediate practicality) in terms of computational complexity. Secondly, it has to provide sound security guarantee without restricted system assumptions. Thirdly, it also has to enable substantial computational savings at the end-user's side as compared to the amount of the efforts that otherwise has to be committed to solve the problem locally. These challenges practically exclude the applicability of the existing techniques developed in the context of secure multi-party computation and fully homomorphic encryption.

 

Our research studies secure computation outsourcing in cloud computing with the above challenges in mind. We focus on widely applicable engineering computing and optimization problems. Our methodology is to explicitly decompose computations into public programs and private data and leverage the structures of specific computations for achieving desirable trade-offs among security, efficiency, and practicality. We plan to organize these secure outsourcing mechanisms into a hierarchy, where computation can be represented at various abstraction levels, such that the aforementioned trade-offs can be flexibly explored in a systematic manner. Two critical applications to be studied in this project include secure outsourcing systems of linear equations (LE) [1] and secure outsourcing linear programming (LP) [2] in the cloud. These two applications are among the most widely used algorithmic and computational tools in various engineering disciplines that analyze and optimize real-world systems. The study would prepare a solid knowledge base and provide insights for further research on more advanced computation problems, such as secure outsourcing convex programming in cloud.

 

Publications

  1. Cong Wang; Bingsheng Zhang; Kui Ren; Roveda, J.M., "Privacy-Assured Outsourcing of Image Reconstruction Service in Cloud," Emerging Topics in Computing, IEEE Transactions on , vol.1, no.1, pp.166,177, June 2013

  2.  

  3. Zhen Xu, Cong Wang, Qian Wang, Kui Ren, and Lingyu Wang. "Proof-carrying cloud computation: The case of convex optimization." In INFOCOM, 2013.

  4.  

  5. Qian Wang, Kui Ren, and Xiaoqiao Meng, "When Cloud Meets eBay: Towards Effective Pricing for Cloud Computing," IEEE INFOCOM 2012, Orlando, Florida, March 25-30, 2012 (Acceptance ratio = 278/1547 = 18%)

  6.  

  7. Cong Wang, Kui Ren, Jia Wang, and Karthik Mahendra Raje Urs, "Harnessing the Cloud for Securely Solving Large Systems of Linear Equations," The 31st International Conference on Distributed Computing Systems (ICDCS'11), Minneapolis, MN, June 20-24, 2011. (Note: this online version is the extended full paper of the conference camera-ready one.)

     

  8. Cong Wang, Kui Ren, and Jia Wang, "Secure and Practical Outsourcing of Linear Programming in Cloud Computing", The 30th IEEE Conference on Computer Communications (INFOCOM'11), Shanghai, China, April 10-15, 2011. (Note: this online version is the extended full paper of the conference camera-ready one.)

  9.  

    Disclaimer: The papers here are made available for timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders.