{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T14:10:32Z","timestamp":1771855832494,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T00:00:00Z","timestamp":1771804800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T00:00:00Z","timestamp":1771804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100012476","name":"Fundamental Research Funds for Central Universities of the Central South University","doi-asserted-by":"publisher","award":["2024JBZX018"],"award-info":[{"award-number":["2024JBZX018"]}],"id":[{"id":"10.13039\/501100012476","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Central Guidance for Local Scientific and Technological Development Fund","award":["246Z0705G"],"award-info":[{"award-number":["246Z0705G"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Currently, the rapid development of Internet of Things (IoT) technology and the deepening digital transformation of traditional industries have driven substantial growth in the Machine Learning as a Service (MLaaS) market to meet massive data processing demands. Principal Component Analysis (PCA), as a widely used dimensionality reduction algorithm in fields such as image processing and finance, involves multiple matrix operations with high computational complexity. As a result, clients with low-capability devices often choose to outsource these computations to cloud servers. However, the privacy and security issues during data outsourcing have become critical challenges that need to be addressed urgently. In this paper, we propose a secure outsourcing computation scheme for PCA based on Householder matrix transformation and Double Random Perturbation Encryption (DRPE) techniques, aiming to protect the privacy of user inputs and outputs. The proposed scheme not only significantly reduces the computational complexity on the client side but also enables the client to detect malicious behaviors from the cloud server with a non-negligible probability, thereby enhancing the security of the data during the outsourcing process and the reliability of the computation results. Furthermore, the proposed scheme adopts a non-interactive design, effectively reducing communication overhead. Through comprehensive security analysis and performance evaluation, we demonstrate the superiority of the proposed scheme in terms of privacy protection, computational efficiency, and verification capability, providing a novel solution for secure outsourcing computing in IoT environments.<\/jats:p>","DOI":"10.1186\/s42400-026-00554-x","type":"journal-article","created":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T13:14:41Z","timestamp":1771852481000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-preserving and efficient outsourcing computation scheme for principal component analysis"],"prefix":"10.1186","volume":"9","author":[{"given":"Yan","family":"Ding","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1791-8275","authenticated-orcid":false,"given":"Ye","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,23]]},"reference":[{"issue":"7","key":"554_CR1","doi-asserted-by":"publisher","first-page":"1357","DOI":"10.1016\/j.patcog.2010.12.015","volume":"44","author":"E Barshan","year":"2011","unstructured":"Barshan E, Ghodsi A, Azimifar Z, Jahromi MZ (2011) Supervised principal component analysis: Visualization, classification and regression on subspaces and submanifolds. Pattern Recogn 44(7):1357\u20131371","journal-title":"Pattern Recogn"},{"issue":"8","key":"554_CR2","doi-asserted-by":"publisher","first-page":"1427","DOI":"10.1109\/JPROC.2018.2853589","volume":"106","author":"T Bouwmans","year":"2018","unstructured":"Bouwmans T, Javed S, Zhang H, Lin Z, Otazo R (2018) On the applications of robust pca in image and video processing. Proc IEEE 106(8):1427\u20131457","journal-title":"Proc IEEE"},{"issue":"2","key":"554_CR3","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1109\/TCAD.2024.3437344","volume":"44","author":"K Cao","year":"2025","unstructured":"Cao K, Chen M, Karnouskos S, Hu S (2025) Reliability-aware personalized deployment of approximate computation iot applications in serverless mobile edge computing. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 44(2):430\u2013443. https:\/\/doi.org\/10.1109\/TCAD.2024.3437344","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"key":"554_CR4","unstructured":"Chai D, Zhang J, Yang L, Jin Y, Wang L, Chen K, Yang Q (2024) Efficient decentralized federated singular vector decomposition. In: 2024 USENIX Annual Technical Conference (USENIX ATC 24), pp 1029\u20131047"},{"issue":"6","key":"554_CR5","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1038\/nbt.4108","volume":"36","author":"H Cho","year":"2018","unstructured":"Cho H, Wu DJ, Berger B (2018) Secure genome-wide association analysis using multiparty computation. Nat Biotechnol 36(6):547\u2013551","journal-title":"Nat Biotechnol"},{"key":"554_CR6","doi-asserted-by":"publisher","unstructured":"Dwork C, Talwar K, Thakurta A, Zhang L (2014) Analyze gauss: optimal bounds for privacy-preserving principal component analysis. In: Shmoys, D.B. (ed.) Symposium on Theory of Computing, STOC 2014, New York, NY, USA, May 31 - June 03, 2014, pp 11\u201320. ACM. https:\/\/doi.org\/10.1145\/2591796.2591883","DOI":"10.1145\/2591796.2591883"},{"key":"554_CR7","doi-asserted-by":"crossref","unstructured":"Froelicher D, Cho H, Edupalli M, Sousa JS, Bossuat J-P, Pyrgelis A, Troncoso-Pastoriza JR, Berger B, Hubaux J-P (2023) Scalable and privacy-preserving federated principal component analysis. In: 2023 IEEE Symposium on Security and Privacy (SP), pp 1908\u20131925. IEEE","DOI":"10.1109\/SP46215.2023.10179350"},{"key":"554_CR8","doi-asserted-by":"publisher","unstructured":"Froelicher D, Cho H, Edupalli M, Sousa JS, Bossuat J, Pyrgelis A, Troncoso-Pastoriza JR, Berger B, Hubaux J (2023) Scalable and privacy-preserving federated principal component analysis. In: 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023, pp 1908\u20131925. IEEE. https:\/\/doi.org\/10.1109\/SP46215.2023.10179350","DOI":"10.1109\/SP46215.2023.10179350"},{"issue":"12","key":"554_CR9","doi-asserted-by":"publisher","first-page":"10948","DOI":"10.1109\/JIOT.2023.3240166","volume":"10","author":"W Gao","year":"2023","unstructured":"Gao W, Yu J, Hao R, Kong F, Liu X (2023) Privacy-preserving face recognition with multi-edge assistance for intelligent security systems. IEEE Internet Things J 10(12):10948\u201310958. https:\/\/doi.org\/10.1109\/JIOT.2023.3240166","journal-title":"IEEE Internet Things J"},{"key":"554_CR10","doi-asserted-by":"publisher","unstructured":"Gennaro R, Gentry C, Parno B (2010) Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Rabin, T. (ed.) Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings. Lecture Notes in Computer Science, vol. 6223, pp 465\u2013482. Springer,. https:\/\/doi.org\/10.1007\/978-3-642-14623-7_25","DOI":"10.1007\/978-3-642-14623-7_25"},{"key":"554_CR11","doi-asserted-by":"crossref","unstructured":"He Z, Ma J, Yuan X (2024) Improved turbo message passing for compressive robust principal component analysis: Algorithm design and asymptotic analysis. IEEE Transactions on Information Theory","DOI":"10.1109\/TIT.2024.3509476"},{"key":"554_CR12","doi-asserted-by":"publisher","unstructured":"Hohenberger S, Lysyanskaya A (2005) How to securely outsource cryptographic computations. In: Kilian, J. (ed.) Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings. Lecture Notes in Computer Science, vol. 3378, pp 264\u2013282. Springer. https:\/\/doi.org\/10.1007\/978-3-540-30576-7_15","DOI":"10.1007\/978-3-540-30576-7_15"},{"issue":"2","key":"554_CR13","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/j.clsr.2017.11.006","volume":"34","author":"WK Hon","year":"2018","unstructured":"Hon WK, Millard C (2018) Banking in the cloud: Part 2-regulation of cloud as \u2018outsourcing\u2019. Computer Law & Security Review 34(2):337\u2013357","journal-title":"Computer Law & Security Review"},{"issue":"6","key":"554_CR14","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1037\/h0071325","volume":"24","author":"H Hotelling","year":"1933","unstructured":"Hotelling H (1933) Analysis of a complex of statistical variables into principal components. J Educ Psychol 24(6):417","journal-title":"J Educ Psychol"},{"issue":"6","key":"554_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-023-2494-1","volume":"17","author":"R Li","year":"2023","unstructured":"Li R, Liu H, Hu Y (2023) Financial performance evaluation and forecasting of enterprises by the combination of pca and cnn deep learning. Front Comp Sci 17(6):176345","journal-title":"Front Comp Sci"},{"key":"554_CR16","doi-asserted-by":"crossref","unstructured":"Lin Y, Zhang T, Mao Y, Zhong S (2024)Crossnet: A low-latency mlaas framework for privacy-preserving neural network inference on resource-limited devices. IEEE Transactions on Dependable and Secure Computing","DOI":"10.1109\/TDSC.2024.3431590"},{"key":"554_CR17","doi-asserted-by":"crossref","unstructured":"Luo Y, Zhang S, Zhang S, Liu J, Liang C, Yang S(2022) Efficient pca-based image compression via secure outsourcing edge cloud. In: 2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC\/DSS\/SmartCity\/DependSys), pp 1586\u20131592. IEEE","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys57074.2022.00242"},{"key":"554_CR18","doi-asserted-by":"crossref","unstructured":"Mundotiya RK, Priya J, Kuwarbi D, Singh T (2024) Enhancing generalizability in biomedical entity recognition: Self-attention pca-cls model. IEEE\/ACM Transactions on Computational Biology and Bioinformatics","DOI":"10.1109\/TCBB.2024.3429234"},{"key":"554_CR19","doi-asserted-by":"publisher","unstructured":"Ni T, Li J, Zhang X, Zuo C, Wang W, Xu W, Luo X, Zhao Q (2023) Exploiting contactless side channels in wireless charging power banks for user privacy inference via few-shot learning. In: Costa-P\u00e9rez, X., Widmer, J., Perino, D., Giustiniano, D., Al-Hassanieh, H., Asadi, A., Cox, L.P. (eds.) Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, ACM MobiCom 2023, Madrid, Spain, October 2-6, 2023, pp 73\u201317315. ACM. https:\/\/doi.org\/10.1145\/3570361.3613288","DOI":"10.1145\/3570361.3613288"},{"key":"554_CR20","doi-asserted-by":"crossref","unstructured":"Pearson K (1901) Liii.on lines and planes of closest fit to systems of points in space. The London, Edinburgh, and Dublin philosophical magazine and journal of science 2(11):559\u2013572","DOI":"10.1080\/14786440109462720"},{"key":"554_CR21","doi-asserted-by":"crossref","unstructured":"Rath S, Rangasamy J, Seal S (2025) A note on \u201csecure and efficient outsourcing of pca-based face recognition\u201d. IEEE Transactions on Information Forensics and Security","DOI":"10.1109\/TIFS.2025.3526057"},{"key":"554_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/J.COSE.2021.102416","volume":"110","author":"Y Ren","year":"2021","unstructured":"Ren Y, Xu X, Feng G, Zhang X (2021) Non-interactive and secure outsourcing of pca-based face recognition. Comput. Secur. 110:102416. https:\/\/doi.org\/10.1016\/J.COSE.2021.102416","journal-title":"Comput. Secur."},{"issue":"1","key":"554_CR23","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/TBDATA.2017.2679760","volume":"4","author":"S Salinas","year":"2018","unstructured":"Salinas S, Luo C, Chen X, Liao W, Li P (2018) Efficient secure outsourcing of large-scale sparse linear systems of equations. IEEE Transactions on Big Data 4(1):26\u201339. https:\/\/doi.org\/10.1109\/TBDATA.2017.2679760","journal-title":"IEEE Transactions on Big Data"},{"issue":"1","key":"554_CR24","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1137\/0909010","volume":"9","author":"HF Walker","year":"1988","unstructured":"Walker HF (1988) Implementation of the gmres method using householder transformations. SIAM J Sci Stat Comput 9(1):152\u2013163","journal-title":"SIAM J Sci Stat Comput"},{"issue":"6","key":"554_CR25","doi-asserted-by":"publisher","first-page":"2162","DOI":"10.1093\/COMJNL\/BXAD130","volume":"67","author":"M Yu","year":"2024","unstructured":"Yu M, Tang Z, Zhang H, Liang X, Zhang X (2024) Video hashing with tensor robust PCA and histogram of optical flow for copy detection. Comput J 67(6):2162\u20132171. https:\/\/doi.org\/10.1093\/COMJNL\/BXAD130","journal-title":"Comput J"},{"key":"554_CR26","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.1109\/TIFS.2019.2947872","volume":"15","author":"Y Zhang","year":"2020","unstructured":"Zhang Y, Xiao X, Yang L-X, Xiang Y, Zhong S (2020) Secure and efficient outsourcing of pca-based face recognition. IEEE Transactions on Information Forensics and Security 15:1683\u20131695. https:\/\/doi.org\/10.1109\/TIFS.2019.2947872","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"554_CR27","doi-asserted-by":"crossref","unstructured":"Zhang Y, Mu C, Kuo H-W, Wright J (2013) Toward guaranteed illumination models for non-convex objects. In: Proceedings of the IEEE International Conference on Computer Vision, pp 937\u2013944","DOI":"10.1109\/ICCV.2013.120"},{"issue":"2","key":"554_CR28","first-page":"1118","volume":"19","author":"L Zhou","year":"2020","unstructured":"Zhou L, Fu A, Yang G, Wang H, Zhang Y (2020) Efficient certificateless multi-copy integrity auditing scheme supporting data dynamics. IEEE Trans Dependable Secure Comput 19(2):1118\u20131132","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"554_CR29","doi-asserted-by":"publisher","unstructured":"Zhou L, Li C (2016) Outsourcing eigen-decomposition and singular value decomposition of large matrix to a public cloud. IEEE Access 4, 869\u2013879 https:\/\/doi.org\/10.1109\/ACCESS.2016.2535103","DOI":"10.1109\/ACCESS.2016.2535103"},{"key":"554_CR30","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.sigpro.2017.11.018","volume":"145","author":"Y Zhu","year":"2018","unstructured":"Zhu Y, Zhu C, Li X (2018) Improved principal component analysis and linear regression classification for face recognition. Signal Process 145:175\u2013182","journal-title":"Signal Process"},{"issue":"1","key":"554_CR31","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/TDSC.2019.2892150","volume":"18","author":"X Zhu","year":"2019","unstructured":"Zhu X, Ayday E, Vitenberg R (2019) A privacy-preserving framework for outsourcing location-based services to the cloud. IEEE Trans Dependable Secure Comput 18(1):384\u2013399","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"554_CR32","doi-asserted-by":"crossref","unstructured":"Zhu J, Wang L, Han X (2022) Safety and performance, why not both? bi-objective optimized model compression toward ai software deployment. In: Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering, pp. 1\u201313","DOI":"10.1145\/3551349.3556906"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-026-00554-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-026-00554-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-026-00554-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T13:14:44Z","timestamp":1771852484000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s42400-026-00554-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,23]]},"references-count":32,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["554"],"URL":"https:\/\/doi.org\/10.1186\/s42400-026-00554-x","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,23]]},"assertion":[{"value":"3 December 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No Conflict of interest exits in the submission of this manuscript, and manuscript is approved by all authors for publication. I would like to declare on behalf of my co-authors that the work described was original research that has not been published previously, and not under consideration for publication elsewhere, in whole or in part","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}],"article-number":"127"}}