Efficient Multiparty Fully Homomorphic Encryption With Computation Fairness and Error Detection in Privacy Preserving Multisource Data Mining

被引:4
|
作者
Guo, Guanglai [1 ]
Zhu, Yan [1 ]
Chen, E. [1 ]
Yu, Ruyun [2 ]
Zhang, Lejun [3 ]
Lv, Kewei [4 ,5 ]
Feng, Rongquan [6 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[2] Cyberspace Secur Co Ltd, China Elect Technol Res Inst, Beijing 10085, Peoples R China
[3] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Peoples R China
[4] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100093, Peoples R China
[5] Chinese Acad Sci, Inst Informat Engn, Beijing 100193, Peoples R China
[6] Peking Univ, Sch Math Sci, Beijing 100871, Peoples R China
基金
中国国家自然科学基金;
关键词
Data privacy; Protocols; Reliability; Privacy; Homomorphic encryption; Distributed databases; Computational modeling; Error detection; homomorphic encryption (HE); multisource data mining; privacy preservation; reliability; secure multiparty computation; ASSOCIATION RULES;
D O I
10.1109/TR.2023.3246563
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we address the problem of data privacy in multisource data mining. To do it, we present a new multiparty fully homomorphic encryption (MP-FHE) scheme, in which all participants are completely fair to perform the same computation. At first, the proposed MP-FHE scheme is divided into five stages (i.e., calculation, configuration, recombination, resharing, and reconstruction stage) to achieve the unified computation form of addition and multiplication. Meanwhile, random bivariate polynomials and commutative encryption are used to achieve the degree reduction of polynomials and the continuity of computation. Moreover, we prove that the scheme meets result consistency and program termination under the fail-stop adversary model. Especially, three kinds of error detection criteria are presented to find errors in three different stages (i.e., recombination, resharing, and reconstruction stage), which provides the monitor basis for the fail-stop adversary model. In addition, the MP-FHE scheme is applied into privacy preserving k-means clustering algorithm. Finally, we evaluate the computation and communication performance of our scheme from both theoretical and experimental aspects, and the evaluation results show that the scheme is efficient enough for multisource data mining.
引用
收藏
页码:1308 / 1323
页数:16
相关论文
共 50 条
  • [21] Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption
    Alabdulatif, Abdulatif
    Kumarage, Heshan
    Khalil, Ibrahim
    Yi, Xun
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2017, 90 : 28 - 45
  • [22] Efficient homomorphic encryption framework for privacy-preserving regression
    Junyoung Byun
    Saerom Park
    Yujin Choi
    Jaewook Lee
    Applied Intelligence, 2023, 53 : 10114 - 10129
  • [23] Efficient homomorphic encryption framework for privacy-preserving regression
    Byun, Junyoung
    Park, Saerom
    Choi, Yujin
    Lee, Jaewook
    APPLIED INTELLIGENCE, 2023, 53 (09) : 10114 - 10129
  • [24] Privacy-Preserving Machine Learning With Fully Homomorphic Encryption for Deep Neural Network
    Lee, Joon-Woo
    Kang, Hyungchul
    Lee, Yongwoo
    Choi, Woosuk
    Eom, Jieun
    Deryabin, Maxim
    Lee, Eunsang
    Lee, Junghyun
    Yoo, Donghoon
    Kim, Young-Sik
    No, Jong-Seon
    IEEE ACCESS, 2022, 10 : 30039 - 30054
  • [25] Memory Efficient Privacy-Preserving Machine Learning Based on Homomorphic Encryption
    Podschwadt, Robert
    Ghazvinian, Parsa
    GhasemiGol, Mohammad
    Takabi, Daniel
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT II, 2024, 14584 : 313 - 339
  • [26] Secure Multiparty Computation and Privacy Preserving scheme using Homomorphic Elliptic Curve Cryptography
    Chouhan, Ankit
    Kumari, Anupam
    Saiyad, Makhduma
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 776 - 780
  • [27] Privacy-Preserving Association Rule Mining Using Homomorphic Encryption in a Multikey Environment
    Pang, Hongping
    Wang, Baocang
    IEEE SYSTEMS JOURNAL, 2021, 15 (02): : 3131 - 3141
  • [28] Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts
    Spathoulas, Georgios
    Theodoridis, Georgios
    Damiris, Georgios-Paraskevas
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (03) : 347 - 370
  • [29] Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts
    Georgios Spathoulas
    Georgios Theodoridis
    Georgios-Paraskevas Damiris
    International Journal of Information Security, 2021, 20 : 347 - 370
  • [30] Privacy-Preserving Auction for Big Data Trading Using Homomorphic Encryption
    Gao, Weichao
    Yu, Wei
    Liang, Fan
    Hatcher, William Grant
    Lu, Chao
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (02): : 776 - 791