Blockchain Trusted Privacy Service Computing Model for CNN

被引:0
|
作者
Ding Y. [1 ]
Shen W. [1 ]
Li H.-S. [2 ,3 ]
Zhong Q.-H. [1 ]
Tian M.-Y. [1 ]
Li J. [1 ]
机构
[1] School of Information, Beijing Wuzi University, Beijing
[2] National Engineering Laboratory for Agri-product Quality Traceability, Beijing Technology and Business University, Beijing
[3] School of Computer Science and Engineering, Beijing Technology and Business University, Beijing
来源
Tien Tzu Hsueh Pao/Acta Electronica Sinica | 2022年 / 50卷 / 06期
关键词
Convolutional neural network; Homomorphic encryption; Privacy protection; Smart contract;
D O I
10.12263/DZXB.20200731
中图分类号
学科分类号
摘要
Data privacy protection and service environment trust have become important issues with the rapidly increasing amount of data and computing power of services in current era of Mobile Internet. This paper studies the trusted privacy service computing model for typical application scenarios of convolutional neural network. It explores data and model computing methods supporting homomorphic encryption to protect data privacy, builds methods of service certificate storage and calculating equity interests distribution based on blockchain and smart contract technology to ensure the openness, transparency, credibility and traceability of service computing. A novel resource and data service paradigm of cloud environment is explored for resource providers, model owners and users to promote the effective integration of resources and develop sharing economy. Finally, the privacy protection method in the model is analyzed through experiments. © 2022, Chinese Institute of Electronics. All right reserved.
引用
收藏
页码:1399 / 1409
页数:10
相关论文
共 28 条
  • [1] WANG X Q., Personal data protection and "consent" segmentationin EU GDPR, Journal of Political Science and Law, 4, pp. 136-146, (2019)
  • [2] CHEN D W, SHAO J, FAN X W, Et al., MAH-ABE based privacy access control in cloud computing, Acta Electronica Sinica, 42, 4, pp. 821-827, (2014)
  • [3] SHAN Z H, REN K, BLANTON M, Et al., Practical secure computation outsourcing, ACM Computing Surveys, 51, 2, pp. 1-40, (2019)
  • [4] JIANG L Z., Research on (Fully) Homomorphic Encryption and Its Application in Cloud Computing, (2018)
  • [5] GU S Z., Research on Fully Homomorphic Encryption Over the Integers and Application in Cloud Platform, (2016)
  • [6] DING Y, SHEN W, LI J, Et al., Research on trusted full-proxy homomorphic transmission mechanism for satellite communication, Chinese Space Science and Technology, 40, 4, pp. 84-96, (2020)
  • [7] GENTRY C., Fully homomorphic encryption using ideal lattices, STOC'09: Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, pp. 169-178, (2009)
  • [8] VAN DIJK M, GENTRY C, HALEVI S, Et al., Fully homomorphic encryption over the integers, 29th Annual International Conference on Theory and Applications of Cryptographic Techniques, pp. 24-43, (2010)
  • [9] CORON J S, MANDAL A, NACCACHE D, Et al., Fully homomorphic encryption over the integers with shorter public keys, Proceedings of Conference on Advances in Cryptology, pp. 487-504, (2011)
  • [10] LIN R L, WANG J, DU H., Improved fully homomorphic encryption over integers, Application Research of Computers, 30, 5, pp. 1515-1519, (2013)