Comments on "Outsourcing Eigen-Decomposition and Singular Value Decomposition of Large Matrix to a Public Cloud"

The outsourcing protocols for Eigen-Decomposition (ED) and Singular Value Decomposition (SVD) proposed by Zhou and Li (2016) offer intriguing advancements but are susceptible to malicious behavior by cloud entities. Our investigation identifies a critical vulnerability in the verification scheme uti...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2024, Vol.12, p.116013-116016
Hauptverfasser: Rath, Satyabrat, Ramalingam, Jothi
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 116016
container_issue
container_start_page 116013
container_title IEEE access
container_volume 12
creator Rath, Satyabrat
Ramalingam, Jothi
description The outsourcing protocols for Eigen-Decomposition (ED) and Singular Value Decomposition (SVD) proposed by Zhou and Li (2016) offer intriguing advancements but are susceptible to malicious behavior by cloud entities. Our investigation identifies a critical vulnerability in the verification scheme utilized by Zhou and Li, where a malicious cloud can deceive the client by providing incorrect results that pass the verification step undetected. This paper not only demonstrates this vulnerability through a detailed attack scenario but also proposes an enhanced verification method to fortify the protocols against such malicious activities, ensuring the integrity and reliability of the schemes proposed by Zhou and Li.
doi_str_mv 10.1109/ACCESS.2024.3443095
format Article
fullrecord <record><control><sourceid>doaj_ieee_</sourceid><recordid>TN_cdi_ieee_primary_10634506</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10634506</ieee_id><doaj_id>oai_doaj_org_article_00543891d95a456dbf6ddf4090cfce55</doaj_id><sourcerecordid>oai_doaj_org_article_00543891d95a456dbf6ddf4090cfce55</sourcerecordid><originalsourceid>FETCH-LOGICAL-c216t-eeeb003819f9a85fcb665a3b4286d170d829d02e407e1e616b3c52302449c2fd3</originalsourceid><addsrcrecordid>eNpVUU1PwzAMrRBITLBfAIdo946k-VhznMqASUNDGnCN0nxUmdpmSlsJ_j0ZndDwwbZsvyfbL0nuEJwjBPnDsihWu908gxmZY0Iw5PQimWSI8RRTzC7P8utk2nV7GC2PJbqYJIfCN41p-w74Fsy2Q9_5ISjXVmDlKtOmj0b55uA717s4IFsNdrE51DKAT1kPBvwf8BZsZKgMeJV9cF-g90CCt6GsnQJF7Qc9u02urKw7Mz3Fm-TjafVevKSb7fO6WG5SFbftU2NMCSHOEbdc5tSqkjEqcUmynGm0gDrPuIaZIXBhkGGIlVjRDMcfEK4yq_FNsh55tZd7cQiukeFbeOnEb8GHSsjQO1UbASElOOdIcyoJZbq0TGtLIIfKKkNp5MIjlwq-64Kxf3wIiqMGYtRAHDUQJw0i6n5EuXjMGYJhQqP7AUvNgws</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Comments on "Outsourcing Eigen-Decomposition and Singular Value Decomposition of Large Matrix to a Public Cloud"</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Rath, Satyabrat ; Ramalingam, Jothi</creator><creatorcontrib>Rath, Satyabrat ; Ramalingam, Jothi</creatorcontrib><description>The outsourcing protocols for Eigen-Decomposition (ED) and Singular Value Decomposition (SVD) proposed by Zhou and Li (2016) offer intriguing advancements but are susceptible to malicious behavior by cloud entities. Our investigation identifies a critical vulnerability in the verification scheme utilized by Zhou and Li, where a malicious cloud can deceive the client by providing incorrect results that pass the verification step undetected. This paper not only demonstrates this vulnerability through a detailed attack scenario but also proposes an enhanced verification method to fortify the protocols against such malicious activities, ensuring the integrity and reliability of the schemes proposed by Zhou and Li.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2024.3443095</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>IEEE</publisher><subject>Eigen decomposition ; Eigenvalues and eigenfunctions ; Matrix decomposition ; Outsourcing ; Principal component analysis ; Protocols ; Robust verification ; Singular value decomposition ; Symmetric matrices ; Vectors</subject><ispartof>IEEE access, 2024, Vol.12, p.116013-116016</ispartof><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c216t-eeeb003819f9a85fcb665a3b4286d170d829d02e407e1e616b3c52302449c2fd3</cites><orcidid>0000-0001-9830-021X ; 0000-0003-1770-9203</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10634506$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>315,781,785,865,2103,4025,27638,27928,27929,27930,54938</link.rule.ids></links><search><creatorcontrib>Rath, Satyabrat</creatorcontrib><creatorcontrib>Ramalingam, Jothi</creatorcontrib><title>Comments on "Outsourcing Eigen-Decomposition and Singular Value Decomposition of Large Matrix to a Public Cloud"</title><title>IEEE access</title><addtitle>Access</addtitle><description>The outsourcing protocols for Eigen-Decomposition (ED) and Singular Value Decomposition (SVD) proposed by Zhou and Li (2016) offer intriguing advancements but are susceptible to malicious behavior by cloud entities. Our investigation identifies a critical vulnerability in the verification scheme utilized by Zhou and Li, where a malicious cloud can deceive the client by providing incorrect results that pass the verification step undetected. This paper not only demonstrates this vulnerability through a detailed attack scenario but also proposes an enhanced verification method to fortify the protocols against such malicious activities, ensuring the integrity and reliability of the schemes proposed by Zhou and Li.</description><subject>Eigen decomposition</subject><subject>Eigenvalues and eigenfunctions</subject><subject>Matrix decomposition</subject><subject>Outsourcing</subject><subject>Principal component analysis</subject><subject>Protocols</subject><subject>Robust verification</subject><subject>Singular value decomposition</subject><subject>Symmetric matrices</subject><subject>Vectors</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpVUU1PwzAMrRBITLBfAIdo946k-VhznMqASUNDGnCN0nxUmdpmSlsJ_j0ZndDwwbZsvyfbL0nuEJwjBPnDsihWu908gxmZY0Iw5PQimWSI8RRTzC7P8utk2nV7GC2PJbqYJIfCN41p-w74Fsy2Q9_5ISjXVmDlKtOmj0b55uA717s4IFsNdrE51DKAT1kPBvwf8BZsZKgMeJV9cF-g90CCt6GsnQJF7Qc9u02urKw7Mz3Fm-TjafVevKSb7fO6WG5SFbftU2NMCSHOEbdc5tSqkjEqcUmynGm0gDrPuIaZIXBhkGGIlVjRDMcfEK4yq_FNsh55tZd7cQiukeFbeOnEb8GHSsjQO1UbASElOOdIcyoJZbq0TGtLIIfKKkNp5MIjlwq-64Kxf3wIiqMGYtRAHDUQJw0i6n5EuXjMGYJhQqP7AUvNgws</recordid><startdate>2024</startdate><enddate>2024</enddate><creator>Rath, Satyabrat</creator><creator>Ramalingam, Jothi</creator><general>IEEE</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-9830-021X</orcidid><orcidid>https://orcid.org/0000-0003-1770-9203</orcidid></search><sort><creationdate>2024</creationdate><title>Comments on "Outsourcing Eigen-Decomposition and Singular Value Decomposition of Large Matrix to a Public Cloud"</title><author>Rath, Satyabrat ; Ramalingam, Jothi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c216t-eeeb003819f9a85fcb665a3b4286d170d829d02e407e1e616b3c52302449c2fd3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Eigen decomposition</topic><topic>Eigenvalues and eigenfunctions</topic><topic>Matrix decomposition</topic><topic>Outsourcing</topic><topic>Principal component analysis</topic><topic>Protocols</topic><topic>Robust verification</topic><topic>Singular value decomposition</topic><topic>Symmetric matrices</topic><topic>Vectors</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Rath, Satyabrat</creatorcontrib><creatorcontrib>Ramalingam, Jothi</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Rath, Satyabrat</au><au>Ramalingam, Jothi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Comments on "Outsourcing Eigen-Decomposition and Singular Value Decomposition of Large Matrix to a Public Cloud"</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2024</date><risdate>2024</risdate><volume>12</volume><spage>116013</spage><epage>116016</epage><pages>116013-116016</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>The outsourcing protocols for Eigen-Decomposition (ED) and Singular Value Decomposition (SVD) proposed by Zhou and Li (2016) offer intriguing advancements but are susceptible to malicious behavior by cloud entities. Our investigation identifies a critical vulnerability in the verification scheme utilized by Zhou and Li, where a malicious cloud can deceive the client by providing incorrect results that pass the verification step undetected. This paper not only demonstrates this vulnerability through a detailed attack scenario but also proposes an enhanced verification method to fortify the protocols against such malicious activities, ensuring the integrity and reliability of the schemes proposed by Zhou and Li.</abstract><pub>IEEE</pub><doi>10.1109/ACCESS.2024.3443095</doi><tpages>4</tpages><orcidid>https://orcid.org/0000-0001-9830-021X</orcidid><orcidid>https://orcid.org/0000-0003-1770-9203</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2169-3536
ispartof IEEE access, 2024, Vol.12, p.116013-116016
issn 2169-3536
2169-3536
language eng
recordid cdi_ieee_primary_10634506
source IEEE Open Access Journals; DOAJ Directory of Open Access Journals; EZB-FREE-00999 freely available EZB journals
subjects Eigen decomposition
Eigenvalues and eigenfunctions
Matrix decomposition
Outsourcing
Principal component analysis
Protocols
Robust verification
Singular value decomposition
Symmetric matrices
Vectors
title Comments on "Outsourcing Eigen-Decomposition and Singular Value Decomposition of Large Matrix to a Public Cloud"
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-12T07%3A39%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-doaj_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Comments%20on%20%22Outsourcing%20Eigen-Decomposition%20and%20Singular%20Value%20Decomposition%20of%20Large%20Matrix%20to%20a%20Public%20Cloud%22&rft.jtitle=IEEE%20access&rft.au=Rath,%20Satyabrat&rft.date=2024&rft.volume=12&rft.spage=116013&rft.epage=116016&rft.pages=116013-116016&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2024.3443095&rft_dat=%3Cdoaj_ieee_%3Eoai_doaj_org_article_00543891d95a456dbf6ddf4090cfce55%3C/doaj_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=10634506&rft_doaj_id=oai_doaj_org_article_00543891d95a456dbf6ddf4090cfce55&rfr_iscdi=true