Comments on "Outsourcing Eigen-Decomposition and Singular Value Decomposition of Large Matrix to a Public Cloud"
The outsourcing protocols for Eigen-Decomposition (ED) and Singular Value Decomposition (SVD) proposed by Zhou and Li (2016) offer intriguing advancements but are susceptible to malicious behavior by cloud entities. Our investigation identifies a critical vulnerability in the verification scheme uti...
Gespeichert in:
Veröffentlicht in: | IEEE access 2024, Vol.12, p.116013-116016 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 116016 |
---|---|
container_issue | |
container_start_page | 116013 |
container_title | IEEE access |
container_volume | 12 |
creator | Rath, Satyabrat Ramalingam, Jothi |
description | The outsourcing protocols for Eigen-Decomposition (ED) and Singular Value Decomposition (SVD) proposed by Zhou and Li (2016) offer intriguing advancements but are susceptible to malicious behavior by cloud entities. Our investigation identifies a critical vulnerability in the verification scheme utilized by Zhou and Li, where a malicious cloud can deceive the client by providing incorrect results that pass the verification step undetected. This paper not only demonstrates this vulnerability through a detailed attack scenario but also proposes an enhanced verification method to fortify the protocols against such malicious activities, ensuring the integrity and reliability of the schemes proposed by Zhou and Li. |
doi_str_mv | 10.1109/ACCESS.2024.3443095 |
format | Article |
fullrecord | <record><control><sourceid>doaj_ieee_</sourceid><recordid>TN_cdi_ieee_primary_10634506</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10634506</ieee_id><doaj_id>oai_doaj_org_article_00543891d95a456dbf6ddf4090cfce55</doaj_id><sourcerecordid>oai_doaj_org_article_00543891d95a456dbf6ddf4090cfce55</sourcerecordid><originalsourceid>FETCH-LOGICAL-c216t-eeeb003819f9a85fcb665a3b4286d170d829d02e407e1e616b3c52302449c2fd3</originalsourceid><addsrcrecordid>eNpVUU1PwzAMrRBITLBfAIdo946k-VhznMqASUNDGnCN0nxUmdpmSlsJ_j0ZndDwwbZsvyfbL0nuEJwjBPnDsihWu908gxmZY0Iw5PQimWSI8RRTzC7P8utk2nV7GC2PJbqYJIfCN41p-w74Fsy2Q9_5ISjXVmDlKtOmj0b55uA717s4IFsNdrE51DKAT1kPBvwf8BZsZKgMeJV9cF-g90CCt6GsnQJF7Qc9u02urKw7Mz3Fm-TjafVevKSb7fO6WG5SFbftU2NMCSHOEbdc5tSqkjEqcUmynGm0gDrPuIaZIXBhkGGIlVjRDMcfEK4yq_FNsh55tZd7cQiukeFbeOnEb8GHSsjQO1UbASElOOdIcyoJZbq0TGtLIIfKKkNp5MIjlwq-64Kxf3wIiqMGYtRAHDUQJw0i6n5EuXjMGYJhQqP7AUvNgws</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Comments on "Outsourcing Eigen-Decomposition and Singular Value Decomposition of Large Matrix to a Public Cloud"</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Rath, Satyabrat ; Ramalingam, Jothi</creator><creatorcontrib>Rath, Satyabrat ; Ramalingam, Jothi</creatorcontrib><description>The outsourcing protocols for Eigen-Decomposition (ED) and Singular Value Decomposition (SVD) proposed by Zhou and Li (2016) offer intriguing advancements but are susceptible to malicious behavior by cloud entities. Our investigation identifies a critical vulnerability in the verification scheme utilized by Zhou and Li, where a malicious cloud can deceive the client by providing incorrect results that pass the verification step undetected. This paper not only demonstrates this vulnerability through a detailed attack scenario but also proposes an enhanced verification method to fortify the protocols against such malicious activities, ensuring the integrity and reliability of the schemes proposed by Zhou and Li.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2024.3443095</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>IEEE</publisher><subject>Eigen decomposition ; Eigenvalues and eigenfunctions ; Matrix decomposition ; Outsourcing ; Principal component analysis ; Protocols ; Robust verification ; Singular value decomposition ; Symmetric matrices ; Vectors</subject><ispartof>IEEE access, 2024, Vol.12, p.116013-116016</ispartof><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c216t-eeeb003819f9a85fcb665a3b4286d170d829d02e407e1e616b3c52302449c2fd3</cites><orcidid>0000-0001-9830-021X ; 0000-0003-1770-9203</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10634506$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>315,781,785,865,2103,4025,27638,27928,27929,27930,54938</link.rule.ids></links><search><creatorcontrib>Rath, Satyabrat</creatorcontrib><creatorcontrib>Ramalingam, Jothi</creatorcontrib><title>Comments on "Outsourcing Eigen-Decomposition and Singular Value Decomposition of Large Matrix to a Public Cloud"</title><title>IEEE access</title><addtitle>Access</addtitle><description>The outsourcing protocols for Eigen-Decomposition (ED) and Singular Value Decomposition (SVD) proposed by Zhou and Li (2016) offer intriguing advancements but are susceptible to malicious behavior by cloud entities. Our investigation identifies a critical vulnerability in the verification scheme utilized by Zhou and Li, where a malicious cloud can deceive the client by providing incorrect results that pass the verification step undetected. This paper not only demonstrates this vulnerability through a detailed attack scenario but also proposes an enhanced verification method to fortify the protocols against such malicious activities, ensuring the integrity and reliability of the schemes proposed by Zhou and Li.</description><subject>Eigen decomposition</subject><subject>Eigenvalues and eigenfunctions</subject><subject>Matrix decomposition</subject><subject>Outsourcing</subject><subject>Principal component analysis</subject><subject>Protocols</subject><subject>Robust verification</subject><subject>Singular value decomposition</subject><subject>Symmetric matrices</subject><subject>Vectors</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpVUU1PwzAMrRBITLBfAIdo946k-VhznMqASUNDGnCN0nxUmdpmSlsJ_j0ZndDwwbZsvyfbL0nuEJwjBPnDsihWu908gxmZY0Iw5PQimWSI8RRTzC7P8utk2nV7GC2PJbqYJIfCN41p-w74Fsy2Q9_5ISjXVmDlKtOmj0b55uA717s4IFsNdrE51DKAT1kPBvwf8BZsZKgMeJV9cF-g90CCt6GsnQJF7Qc9u02urKw7Mz3Fm-TjafVevKSb7fO6WG5SFbftU2NMCSHOEbdc5tSqkjEqcUmynGm0gDrPuIaZIXBhkGGIlVjRDMcfEK4yq_FNsh55tZd7cQiukeFbeOnEb8GHSsjQO1UbASElOOdIcyoJZbq0TGtLIIfKKkNp5MIjlwq-64Kxf3wIiqMGYtRAHDUQJw0i6n5EuXjMGYJhQqP7AUvNgws</recordid><startdate>2024</startdate><enddate>2024</enddate><creator>Rath, Satyabrat</creator><creator>Ramalingam, Jothi</creator><general>IEEE</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-9830-021X</orcidid><orcidid>https://orcid.org/0000-0003-1770-9203</orcidid></search><sort><creationdate>2024</creationdate><title>Comments on "Outsourcing Eigen-Decomposition and Singular Value Decomposition of Large Matrix to a Public Cloud"</title><author>Rath, Satyabrat ; Ramalingam, Jothi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c216t-eeeb003819f9a85fcb665a3b4286d170d829d02e407e1e616b3c52302449c2fd3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Eigen decomposition</topic><topic>Eigenvalues and eigenfunctions</topic><topic>Matrix decomposition</topic><topic>Outsourcing</topic><topic>Principal component analysis</topic><topic>Protocols</topic><topic>Robust verification</topic><topic>Singular value decomposition</topic><topic>Symmetric matrices</topic><topic>Vectors</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Rath, Satyabrat</creatorcontrib><creatorcontrib>Ramalingam, Jothi</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Rath, Satyabrat</au><au>Ramalingam, Jothi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Comments on "Outsourcing Eigen-Decomposition and Singular Value Decomposition of Large Matrix to a Public Cloud"</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2024</date><risdate>2024</risdate><volume>12</volume><spage>116013</spage><epage>116016</epage><pages>116013-116016</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>The outsourcing protocols for Eigen-Decomposition (ED) and Singular Value Decomposition (SVD) proposed by Zhou and Li (2016) offer intriguing advancements but are susceptible to malicious behavior by cloud entities. Our investigation identifies a critical vulnerability in the verification scheme utilized by Zhou and Li, where a malicious cloud can deceive the client by providing incorrect results that pass the verification step undetected. This paper not only demonstrates this vulnerability through a detailed attack scenario but also proposes an enhanced verification method to fortify the protocols against such malicious activities, ensuring the integrity and reliability of the schemes proposed by Zhou and Li.</abstract><pub>IEEE</pub><doi>10.1109/ACCESS.2024.3443095</doi><tpages>4</tpages><orcidid>https://orcid.org/0000-0001-9830-021X</orcidid><orcidid>https://orcid.org/0000-0003-1770-9203</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2024, Vol.12, p.116013-116016 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_ieee_primary_10634506 |
source | IEEE Open Access Journals; DOAJ Directory of Open Access Journals; EZB-FREE-00999 freely available EZB journals |
subjects | Eigen decomposition Eigenvalues and eigenfunctions Matrix decomposition Outsourcing Principal component analysis Protocols Robust verification Singular value decomposition Symmetric matrices Vectors |
title | Comments on "Outsourcing Eigen-Decomposition and Singular Value Decomposition of Large Matrix to a Public Cloud" |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-12T07%3A39%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-doaj_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Comments%20on%20%22Outsourcing%20Eigen-Decomposition%20and%20Singular%20Value%20Decomposition%20of%20Large%20Matrix%20to%20a%20Public%20Cloud%22&rft.jtitle=IEEE%20access&rft.au=Rath,%20Satyabrat&rft.date=2024&rft.volume=12&rft.spage=116013&rft.epage=116016&rft.pages=116013-116016&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2024.3443095&rft_dat=%3Cdoaj_ieee_%3Eoai_doaj_org_article_00543891d95a456dbf6ddf4090cfce55%3C/doaj_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=10634506&rft_doaj_id=oai_doaj_org_article_00543891d95a456dbf6ddf4090cfce55&rfr_iscdi=true |