• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2015, Vol. 37 ›› Issue (10): 1806-1810.

• 论文 • Previous Articles     Next Articles

Secure outsourcing of extreme learning
machine in cloud computing  

LIN Jiarun1,YIN Jianping1,CAI Zhiping1,ZHU Ming1,CHENG Yong2   

  1. (1.College of Computer,National University of Defense Technology,Changsha 410073;
    2.Information Center,National University of Defense Technology,Changsha 410073,China)
  • Received:2015-08-10 Revised:2015-09-26 Online:2015-10-25 Published:2015-10-25

Abstract:

Duo to the enlarging volume and increasingly complex structure of data involved in applications, running the extreme learning machine (ELM) over largescale data becomes a challenging task.In order to reduce the training time while assuring the confidentiality of ELM’s input and output, we present a secure and practical outsourcing mechanism for ELM in cloud computing.In this mechanism, we explicitly divide the ELM into two parts: public part and private part.The latter is executed locally to generate random parameters and do some simple matrix computation while the former part is outsourced by cloud computing that is mainly responsible for calculating the MoorePenrose generalized inverse, the heaviest computational operation. The inverse also serves as the correctness and soundness proof in result verification.We analyze the confidentiality theoretically and the experimental results demonstrate that the proposed mechanism can effectively release customers from heavy computation.

Key words: cloud computing;extreme learning machine;computing outsourcing;data security;privacy-preserving;result verification