{"title":"Towards privacy-preserving compressed sensing reconstruction in cloud","authors":"Kaidi Xu , Jia Yu , Wenjing Gao","doi":"10.1016/j.cose.2025.104348","DOIUrl":null,"url":null,"abstract":"<div><div>Compressed sensing is widely used in various fields. Its reconstruction process is highly complex and time-consuming. For resource-constrained Internet of Things (IoT) devices, there are usually not enough computational and storage resources to handle it. The prevalent solution to this problem involves secure outsourcing the compressed sensing reconstruction task to the cloud. Nonetheless, existing privacy-preserving compressed sensing reconstruction protocols are primarily designed based on linear programming, but not applicable to other reconstruction methods. In these protocols, the computational cost on the user and the cloud is still high. To tackle these issues, we design a privacy-preserving compressed sensing reconstruction protocol specifically tailored for IoT applications. Different from existing works, our proposed protocol can be applicable to all reconstruction algorithms. It allows the cloud flexibly choose the appropriate signal reconstruction method. The proposed protocol directly encrypts the reconstruction problem. In the ciphertext state, the reconstruction problem is transformed into other forms of the problem for solving. We use a signal obfuscation method for encryption in the proposed protocol. The user no longer needs to perform matrix multiplication calculations for encryption, saving a lot of computational resources. Our proposed protocol not only ensures the client privacy by preventing data leakage to cloud but also effectively reduces computational complexity for both the user and the cloud. Finally, we theoretically analyze the correctness and security of the protocol and experimentally verify its feasibility.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"151 ","pages":"Article 104348"},"PeriodicalIF":4.8000,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825000379","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Compressed sensing is widely used in various fields. Its reconstruction process is highly complex and time-consuming. For resource-constrained Internet of Things (IoT) devices, there are usually not enough computational and storage resources to handle it. The prevalent solution to this problem involves secure outsourcing the compressed sensing reconstruction task to the cloud. Nonetheless, existing privacy-preserving compressed sensing reconstruction protocols are primarily designed based on linear programming, but not applicable to other reconstruction methods. In these protocols, the computational cost on the user and the cloud is still high. To tackle these issues, we design a privacy-preserving compressed sensing reconstruction protocol specifically tailored for IoT applications. Different from existing works, our proposed protocol can be applicable to all reconstruction algorithms. It allows the cloud flexibly choose the appropriate signal reconstruction method. The proposed protocol directly encrypts the reconstruction problem. In the ciphertext state, the reconstruction problem is transformed into other forms of the problem for solving. We use a signal obfuscation method for encryption in the proposed protocol. The user no longer needs to perform matrix multiplication calculations for encryption, saving a lot of computational resources. Our proposed protocol not only ensures the client privacy by preventing data leakage to cloud but also effectively reduces computational complexity for both the user and the cloud. Finally, we theoretically analyze the correctness and security of the protocol and experimentally verify its feasibility.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.