{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:59:14Z","timestamp":1750309154717,"version":"3.41.0"},"reference-count":41,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T00:00:00Z","timestamp":1695686400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61801131 and 61976063"],"award-info":[{"award-number":["61801131 and 61976063"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Guangxi Natural Science Foundation","award":["2022GXNSFAA035632 and 2022GXNSFFA035028"],"award-info":[{"award-number":["2022GXNSFAA035632 and 2022GXNSFFA035028"]}]},{"DOI":"10.13039\/501100009007","name":"Guangxi Normal University","doi-asserted-by":"crossref","award":["2021JC006"],"award-info":[{"award-number":["2021JC006"]}],"id":[{"id":"10.13039\/501100009007","id-type":"DOI","asserted-by":"crossref"}]},{"name":"AI+Education research project of Guangxi Humanities Society Science Development Research Center","award":["ZXZJ202205"],"award-info":[{"award-number":["ZXZJ202205"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2023,9,30]]},"abstract":"<jats:p>Large-scale matrix determinants and linear equations are two basic computational tools in science and engineering fields. However, it is difficult for a resource-constrained client to solve large-scale computational tasks. Cloud computing service provides additional computing resources for resource-constrained clients. To solve the problem of large-scale computation, in this article, a secure and efficient framework is proposed to outsource large-scale matrix determinants and linear equations to a cloud. Specifically, the proposed framework contains two protocols, which solve large-scale matrix determinant and linear equations, respectively. In the outsourcing protocols of large-scale matrix determinants and linear equations, the task matrix is encrypted and sent to the cloud by the client. The encrypted task matrix is directly computed by using LU factorization in the cloud. The computed result is returned and verified by the cloud and the client, respectively. The computed result is decrypted if it passes the verification. Otherwise, it is returned to the cloud for recalculation. The framework can protect the input privacy and output privacy of the client. The framework also can guarantee the correctness of the result and reduce the local computational complexity. Furthermore, the experimental results show that the framework can save more than 70% of computing resources after outsourcing computing. Thus, this article provides a secure and efficient alternative for solving large-scale computational tasks.<\/jats:p>","DOI":"10.1145\/3611014","type":"journal-article","created":{"date-parts":[[2023,7,26]],"date-time":"2023-07-26T11:59:58Z","timestamp":1690372798000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Secure and Efficient Framework for Outsourcing Large-scale Matrix Determinant and Linear Equations"],"prefix":"10.1145","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0117-4614","authenticated-orcid":false,"given":"Yuling","family":"Luo","sequence":"first","affiliation":[{"name":"Guangxi Key Lab of Brain-inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-3386-1226","authenticated-orcid":false,"given":"Shiqi","family":"Zhang","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Brain-inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0783-4051","authenticated-orcid":false,"given":"Shunsheng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Brain-inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9790-1571","authenticated-orcid":false,"given":"Junxiu","family":"Liu","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Brain-inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8318-3038","authenticated-orcid":false,"given":"Yanhu","family":"Wang","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Brain-inspired Computing and Intelligent Chips, School of Electronic and Information Engineering, Guangxi Normal University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6618-7483","authenticated-orcid":false,"given":"Su","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Swansea University, UK"}]}],"member":"320","published-online":{"date-parts":[[2023,9,26]]},"reference":[{"key":"e_1_3_1_2_2","first-page":"2","volume-title":"1st International Conference on Parallel, Distributed and Grid Computing (PDGC\u201910)","author":"Buyya Rajkumar","year":"2010","unstructured":"Rajkumar Buyya. 2010. Cloud computing: The next revolution in information technology. In 1st International Conference on Parallel, Distributed and Grid Computing (PDGC\u201910). 2\u20133."},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2378757"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2013.11.007"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2363765"},{"issue":"2","key":"e_1_3_1_6_2","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1109\/TCC.2018.2880181","article-title":"Efficient and secure outsourcing of large-scale linear system of equations","volume":"9","author":"Ding Qi","year":"2018","unstructured":"Qi Ding, Guobiao Weng, Guohui Zhao, and Changhui Hu. 2018. Efficient and secure outsourcing of large-scale linear system of equations. IEEE Trans. Cloud Comput. 9, 2 (2018), 587\u2013597.","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"1","key":"e_1_3_1_7_2","first-page":"1110","article-title":"Secure distributed outsourcing of large-scale linear systems","volume":"1","author":"Feng Da","year":"2022","unstructured":"Da Feng, Fucai Zhou, Debiao He, Mengna Guo, and Qiyu Wu. 2022. Secure distributed outsourcing of large-scale linear systems. Proc. Int. Conf. Distrib. Comput. Syst. 1, 1 (2022), 1110\u20131121.","journal-title":"Proc. Int. Conf. Distrib. Comput. Syst."},{"issue":"1","key":"e_1_3_1_8_2","first-page":"1","article-title":"Cloud-based outsourcing for enabling privacy-preserving large-scale non-negative matrix factorization","volume":"15","author":"Fu Anmin","year":"2019","unstructured":"Anmin Fu, Zhenzhu Chen, Yi Mu, Willy Susilo, Yinxia Sun, and Jie Wu. 2019. Cloud-based outsourcing for enabling privacy-preserving large-scale non-negative matrix factorization. IEEE Trans. Serv. Comput. 15, 1 (2019), 1\u201313.","journal-title":"IEEE Trans. Serv. Comput."},{"key":"e_1_3_1_9_2","first-page":"3","volume-title":"Cloud Computing and Security Conference","author":"Fu Shaojing","year":"2017","unstructured":"Shaojing Fu, Yunpeng Yu, and Ming Xu. 2017. Practical privacy-preserving outsourcing of large-scale matrix determinant computation in the cloud. In Cloud Computing and Security Conference. 3\u201315."},{"issue":"1","key":"e_1_3_1_10_2","doi-asserted-by":"crossref","first-page":"106958","DOI":"10.1109\/ACCESS.2020.3000683","article-title":"Secure outsourcing algorithm of BTC feature extraction in cloud computing","volume":"8","author":"Jiang Mingfang","year":"2020","unstructured":"Mingfang Jiang and Hengfu Yang. 2020. Secure outsourcing algorithm of BTC feature extraction in cloud computing. IEEE Access 8, 1 (2020), 106958\u2013106967.","journal-title":"IEEE Access"},{"issue":"1","key":"e_1_3_1_11_2","first-page":"205","article-title":"Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud","volume":"280","author":"Lei Xinyu","year":"2014","unstructured":"Xinyu Lei, Xiaofeng Liao, Tingwen Huang, and Feno Heriniaina. 2014. Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud. Inf. Sci. 280, 1 (2014), 205\u2013217.","journal-title":"Inf. Sci."},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2331694"},{"issue":"1","key":"e_1_3_1_13_2","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/TCC.2013.7","article-title":"Outsourcing large matrix inversion computation to a public Cloud","volume":"1","author":"Lei Xinyu","year":"2013","unstructured":"Xinyu Lei, Xiaofeng Liao, Tingwen Huang, Huaqing Li, and Chunqiang Hu. 2013. Outsourcing large matrix inversion computation to a public Cloud. IEEE Trans. Cloud Comput. 1, 1 (2013), 78\u201387.","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"3","key":"e_1_3_1_14_2","first-page":"1","article-title":"Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation","volume":"61","author":"Li Dongmei","year":"2018","unstructured":"Dongmei Li, Xiaolei Dong, Zhenfu Cao, and Haijiang Wang. 2018. Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation. Sci. China Inf. Sci. 61, 3 (2018), 1\u20139.","journal-title":"Sci. China Inf. Sci."},{"issue":"1","key":"e_1_3_1_15_2","first-page":"1","article-title":"Secure multiparty computation for privacy preserving data mining","volume":"1","author":"Lindell Yehida","year":"2011","unstructured":"Yehida Lindell. 2011. Secure multiparty computation for privacy preserving data mining. Encyc. Data Warehous. Mining 1, 1 (2011), 1\u201339.","journal-title":"Encyc. Data Warehous. Mining"},{"issue":"6","key":"e_1_3_1_16_2","doi-asserted-by":"crossref","first-page":"146807","DOI":"10.1007\/s11704-019-9189-7","article-title":"Secure outsourcing of large matrix determinant computation","volume":"14","author":"Liu Jiayang","year":"2020","unstructured":"Jiayang Liu, Jingguo Bi, and Mu Li. 2020. Secure outsourcing of large matrix determinant computation. Front. Comput. Sci. 14, 6 (2020), 146807\u2013146819.","journal-title":"Front. Comput. Sci."},{"key":"e_1_3_1_17_2","first-page":"591","volume-title":"Proceedings of the International Conference on Advanced Information Networking and Applications (AINA\u201914)","author":"Nie Haixin","year":"2014","unstructured":"Haixin Nie, Xiaofeng Chen, Jin Li, Josolph Liu, and Wenjing Lou. 2014. Efficient and verifiable algorithm for secure outsourcing of large-scale linear programming. In Proceedings of the International Conference on Advanced Information Networking and Applications (AINA\u201914). 591\u2013596."},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.14"},{"issue":"1","key":"e_1_3_1_19_2","first-page":"1","article-title":"Outsourcing LDA-based face recognition to an untrusted cloud","volume":"1","author":"Ren Yanli","year":"2022","unstructured":"Yanli Ren, Zhuhuan Song, Shifeng Sun, Joseph Liu, and Guorui Feng. 2022. Outsourcing LDA-based face recognition to an untrusted cloud. IEEE Trans. Depend. Sec. Comput. 1, 1 (2022), 1\u201312.","journal-title":"IEEE Trans. Depend. Sec. Comput."},{"key":"e_1_3_1_20_2","first-page":"1035","volume-title":"Proceedings of the IEEE INFOCOM Conference","author":"Salinas Sergio","year":"2015","unstructured":"Sergio Salinas, Changqing Luo, Xuhui Chen, and Pan Li. 2015. Efficient secure outsourcing of large-scale linear systems of equations. In Proceedings of the IEEE INFOCOM Conference. 1035\u20131043."},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3158363"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2013.39"},{"issue":"20","key":"e_1_3_1_23_2","first-page":"1","article-title":"Secure outsourcing of matrix determinant computation under the malicious cloud","volume":"21","author":"Song Mingyang","year":"2021","unstructured":"Mingyang Song and Yingpeng Sang. 2021. Secure outsourcing of matrix determinant computation under the malicious cloud. Sensors 21, 20 (2021), 1\u201320.","journal-title":"Sensors"},{"key":"e_1_3_1_24_2","first-page":"820","volume-title":"Proceedings of the IEEE INFOCOM Conference","author":"Wang Cong","year":"2011","unstructured":"Cong Wang, Kui Ren, and Jia Wang. 2011. Secure and practical outsourcing of linear programming in cloud computing. In Proceedings of the IEEE INFOCOM Conference. 820\u2013828."},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2417542"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.206"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2273797"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.165"},{"issue":"1","key":"e_1_3_1_29_2","doi-asserted-by":"crossref","first-page":"60126","DOI":"10.1109\/ACCESS.2019.2915196","article-title":"Efficient and secure outsourcing of DFT, IDFT, and circular convolution","volume":"7","author":"Xiao Xiangli","year":"2019","unstructured":"Xiangli Xiao, Junjian Huang, Yushu Zhang, and Xing He. 2019. Efficient and secure outsourcing of DFT, IDFT, and circular convolution. IEEE Access 7, 1 (2019), 60126\u201360133.","journal-title":"IEEE Access"},{"issue":"1","key":"e_1_3_1_30_2","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1016\/j.ins.2020.03.003","article-title":"Secure and efficient outsourcing computation on large-scale linear regressions","volume":"522","author":"Yang Yang","year":"2020","unstructured":"Yang Yang, Ping Xiong, Qing Huang, and Fei Chen. 2020. Secure and efficient outsourcing computation on large-scale linear regressions. Inf. Sci. 522, 1 (2020), 134\u2013147.","journal-title":"Inf. Sci."},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3110101"},{"issue":"12","key":"e_1_3_1_32_2","doi-asserted-by":"crossref","first-page":"7566","DOI":"10.1109\/TII.2019.2957404","article-title":"A low-overhead, confidentiality-assured, and authenticated data acquisition framework for IoT","volume":"16","author":"Zhang Yushu","year":"2019","unstructured":"Yushu Zhang, Qi He, Guo Chen, Xinpeng Zhang, and Yong Xiang. 2019. A low-overhead, confidentiality-assured, and authenticated data acquisition framework for IoT. IEEE Trans. Industr. Inform. 16, 12 (2019), 7566\u20137578.","journal-title":"IEEE Trans. Industr. Inform."},{"issue":"5","key":"e_1_3_1_33_2","doi-asserted-by":"crossref","first-page":"1380","DOI":"10.1109\/JIOT.2017.2732357","article-title":"Harnessing the hybrid cloud for secure big image data service","volume":"4","author":"Zhang Yushu","year":"2017","unstructured":"Yushu Zhang, Hui Huang, Yong Xiang, Leo Yu Zhang, and Xing He. 2017. Harnessing the hybrid cloud for secure big image data service. IEEE Internet Things J. 4, 5 (2017), 1380\u20131388.","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"e_1_3_1_34_2","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1016\/j.ins.2018.12.055","article-title":"Cloud-assisted privacy-conscious large-scale Markowitz portfolio","volume":"527","author":"Zhang Yushu","year":"2020","unstructured":"Yushu Zhang, Jin Jiang, Yong Xiang, Ye Zhu, Liangtian Wan, and Xiyuan Xie. 2020. Cloud-assisted privacy-conscious large-scale Markowitz portfolio. Inf. Sci. 527, 1 (2020), 548\u2013559.","journal-title":"Inf. Sci."},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2966511"},{"issue":"4","key":"e_1_3_1_36_2","first-page":"1","article-title":"Privacy-assured FogCS: Chaotic compressive sensing for secure industrial big image data processing in fog computing","volume":"3203","author":"Zhang Yushu","year":"2020","unstructured":"Yushu Zhang, Ping Wang, Hui Huang, Youwen Zhu, Di Xiao, and Yong Xiang. 2020. Privacy-assured FogCS: Chaotic compressive sensing for secure industrial big image data processing in fog computing. IEEE Trans. Industr. Inform. 3203, 4 (2020), 1\u201311.","journal-title":"IEEE Trans. Industr. Inform."},{"issue":"1","key":"e_1_3_1_37_2","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1016\/j.ins.2019.05.024","article-title":"Efficiently and securely outsourcing compressed sensing reconstruction to a cloud","volume":"496","author":"Zhang Yushu","year":"2019","unstructured":"Yushu Zhang, Yong Xiang, Leo Yu Zhang, Lu-Xing Yang, and Jiantao Zhou. 2019. Efficiently and securely outsourcing compressed sensing reconstruction to a cloud. Inf. Sci. 496, 1 (2019), 150\u2013160.","journal-title":"Inf. Sci."},{"issue":"4","key":"e_1_3_1_38_2","doi-asserted-by":"crossref","first-page":"1683","DOI":"10.1109\/TIFS.2019.2947872","article-title":"Secure and efficient outsourcing of PCA-based face recognition","volume":"15","author":"Zhang Yushu","year":"2020","unstructured":"Yushu Zhang, Xiangli Xiao, Lu-Xing Yang, Yong Xiang, and Sheng Zhong. 2020. Secure and efficient outsourcing of PCA-based face recognition. IEEE Trans. Inf. Forens. Secur. 15, 4 (2020), 1683\u20131695.","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"issue":"1","key":"e_1_3_1_39_2","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1109\/TIFS.2019.2922277","article-title":"How to securely outsource finding the min-cut of undirected edge-weighted graphs","volume":"15","author":"Zhao Pu","year":"2020","unstructured":"Pu Zhao, Jia Yu, Hanlin Zhang, Zhan Qin, and Cong Wang. 2020. How to securely outsource finding the min-cut of undirected edge-weighted graphs. IEEE Trans. Inf. Forens. Secur. 15, 1 (2020), 315\u2013328.","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"issue":"1","key":"e_1_3_1_40_2","doi-asserted-by":"crossref","first-page":"2581","DOI":"10.1109\/ACCESS.2015.2505720","article-title":"Outsourcing large-scale quadratic programming to a public cloud","volume":"3","author":"Zhou Lifeng","year":"2015","unstructured":"Lifeng Zhou and Chunguang Li. 2015. Outsourcing large-scale quadratic programming to a public cloud. IEEE Access 3, 1 (2015), 2581\u20132589.","journal-title":"IEEE Access"},{"issue":"1","key":"e_1_3_1_41_2","doi-asserted-by":"crossref","first-page":"869","DOI":"10.1109\/ACCESS.2016.2535103","article-title":"Outsourcing eigen-decomposition and singular value decomposition of large matrix to a public cloud","volume":"4","author":"Zhou Lifeng","year":"2016","unstructured":"Lifeng Zhou and Chunguang Li. 2016. Outsourcing eigen-decomposition and singular value decomposition of large matrix to a public cloud. IEEE Access 4, 1 (2016), 869\u2013879.","journal-title":"IEEE Access"},{"issue":"1","key":"e_1_3_1_42_2","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1016\/j.future.2017.09.031","article-title":"Efficiently and securely harnessing cloud to solve linear regression and other matrix operations","volume":"81","author":"Zhou Lu","year":"2018","unstructured":"Lu Zhou, Youwen Zhu, and Kim Kwang Raymond Choo. 2018. Efficiently and securely harnessing cloud to solve linear regression and other matrix operations. Fut. Gen. Comput. Syst. 81, 1 (2018), 404\u2013413.","journal-title":"Fut. Gen. Comput. Syst."}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611014","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611014","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:50:52Z","timestamp":1750287052000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611014"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,26]]},"references-count":41,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,9,30]]}},"alternative-id":["10.1145\/3611014"],"URL":"https:\/\/doi.org\/10.1145\/3611014","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"type":"print","value":"1539-9087"},{"type":"electronic","value":"1558-3465"}],"subject":[],"published":{"date-parts":[[2023,9,26]]},"assertion":[{"value":"2022-10-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-07-22","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-09-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}