Secure and verifiable outsourcing of nonnegative matrix factorization (NMF)
Duan, Jia; Zhou, Jiantao; Li, Yuanman
2016
Conference Name4th ACM Information Hiding and Multimedia Security Workshop, IH and MMSec 2016
Source PublicationIH and MMSec 2016 - Proceedings of the 2016 ACM Information Hiding and Multimedia Security Workshop
Pages63-68
Conference Date6 20, 2016 - 6 22, 2016
Conference PlaceVigo, Galicia, Spain
Author of SourceAssociation for Computing Machinery, Inc
AbstractCloud computing platforms are becoming increasingly prevalent and readily available nowadays, providing us alternative and economic services for resource-constrained clients to perform large-scale computation. In this work, we ad- dress the problem of secure outsourcing of large-scale non- negative matrix factorization (NMF) to a cloud in a way that the client can verify the correctness of results with small overhead. The input matrix protection is achieved by a lightweight, permutation-based encryption mechanism. By exploiting the iterative nature of NMF computation, we propose a single-round verification strategy, which can be proved to be effective. Both theoretical and experimental results are given to demonstrate the superior performance of our scheme. © 2016 ACM.
DOI10.1145/2909827.2930794
Language英语
Fulltext Access
Citation statistics
Document TypeConference paper
CollectionDEPARTMENT OF COMPUTER AND INFORMATION SCIENCE
AffiliationUniversity of Macau, China
First Author AffilicationUniversity of Macau
Recommended Citation
GB/T 7714
Duan, Jia,Zhou, Jiantao,Li, Yuanman. Secure and verifiable outsourcing of nonnegative matrix factorization (NMF)[C]//Association for Computing Machinery, Inc,2016:63-68.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Duan, Jia]'s Articles
[Zhou, Jiantao]'s Articles
[Li, Yuanman]'s Articles
Baidu academic
Similar articles in Baidu academic
[Duan, Jia]'s Articles
[Zhou, Jiantao]'s Articles
[Li, Yuanman]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Duan, Jia]'s Articles
[Zhou, Jiantao]'s Articles
[Li, Yuanman]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.