Privacy-preserving multikey computing framework for encrypted data in the cloud

被引:8
|
作者
Zhang, Jun [1 ]
Jiang, Zoe L. [2 ]
Li, Ping [3 ]
Yiu, Siu Ming [4 ]
机构
[1] Shenzhen Univ, Shenzhen, Guangdong, Peoples R China
[2] Harbin Inst Technol Shenzhen, Shenzhen, Guangdong, Peoples R China
[3] South China Normal Univ, Guangzhou, Guangdong, Peoples R China
[4] Univ Hong Kong, Pokfulam Rd, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy-preserving computing framework; Cloud computing; Homomorphic encryption; Multiple keys; SECURE;
D O I
10.1016/j.ins.2021.06.017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Preparing large amounts of training data is the key to the success of machine learning. Due to the public's concern about individual privacy, different techniques are proposed to achieve privacy preserving machine learning. Homomorphic encryption enables calculation on encrypted data in the cloud. However, current schemes either focus on single key or a specific algorithm. Cooperation between different institutions is quite common in this era of big data. Encrypting data from different institutions under one single key is a risk to data privacy. Moreover, constructing secure scheme for a specific machine learning algorithm lacks universality. Based on an additively homomorphic encryption supporting one multiplication, we propose a general multikey computing framework to execute common arithmetic operations on encrypted data such as addition, multiplication, comparison, sorting, division and etc. Our scheme can be used to run different machine learning algorithms. Our scheme is proven to be secure against semi-honest attackers and the experimental evaluations demonstrate the practicality of our computing framework. (c) 2021 Elsevier Inc. All rights reserved.
引用
收藏
页码:217 / 230
页数:14
相关论文
共 50 条
  • [41] Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data
    Qiu, Shuo
    Wang, Boyang
    Li, Ming
    Liu, Jiqiang
    Shi, Yanfeng
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (01) : 312 - 323
  • [42] Verifiable Search Meets Blockchain: A Privacy-Preserving Framework for Outsourced Encrypted Data
    Jiang, Shunrong
    Liu, Jianqing
    Wang, Liangmin
    Yoo, Seong-Moo
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [43] Research on Privacy-Preserving Technology for Cloud Computing
    Wang, Xiaolong
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ELECTRONICS INFORMATION (ICACSEI 2013), 2013, 41 : 636 - 639
  • [44] Privacy-preserving outsourced classification in cloud computing
    Ping Li
    Jin Li
    Zhengan Huang
    Chong-Zhi Gao
    Wen-Bin Chen
    Kai Chen
    Cluster Computing, 2018, 21 : 277 - 286
  • [45] Privacy-preserving outsourced classification in cloud computing
    Li, Ping
    Li, Jin
    Huang, Zhengan
    Gao, Chong-Zhi
    Chen, Wen-Bin
    Chen, Kai
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01): : 277 - 286
  • [46] A Parallel Privacy-Preserving k-Means Clustering Algorithm for Encrypted Databases in Cloud Computing
    Song, Youngho
    Kim, Hyeong-Jin
    Lee, Hyun-Jo
    Chang, Jae-Woo
    APPLIED SCIENCES-BASEL, 2024, 14 (02):
  • [47] Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing
    Gai, Keke
    Qiu, Meikang
    Zhao, Hui
    IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (04) : 678 - 688
  • [48] Privacy-preserving smart data storage for financial industry in cloud computing
    Qiu, Meikang
    Gai, Keke
    Zhao, Hui
    Liu, Meiqin
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2018, 30 (05):
  • [49] Privacy-preserving public auditing for educational multimedia data in cloud computing
    Kim, Daeyeong
    Kwon, Hyunsoo
    Hahn, Changhee
    Hur, Junbeom
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (21) : 13077 - 13091
  • [50] A Retrievable Data Perturbation Method Used in Privacy-Preserving in Cloud Computing
    Yang Pan
    Gui Xiaolin
    An Jian
    Yao Jing
    Lin Jiancai
    Tian Feng
    CHINA COMMUNICATIONS, 2014, 11 (08) : 73 - 84