Efficient Multiparty Fully Homomorphic Encryption With Computation Fairness and Error Detection in Privacy Preserving Multisource Data Mining

被引:4
|
作者
Guo, Guanglai [1 ]
Zhu, Yan [1 ]
Chen, E. [1 ]
Yu, Ruyun [2 ]
Zhang, Lejun [3 ]
Lv, Kewei [4 ,5 ]
Feng, Rongquan [6 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[2] Cyberspace Secur Co Ltd, China Elect Technol Res Inst, Beijing 10085, Peoples R China
[3] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Peoples R China
[4] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100093, Peoples R China
[5] Chinese Acad Sci, Inst Informat Engn, Beijing 100193, Peoples R China
[6] Peking Univ, Sch Math Sci, Beijing 100871, Peoples R China
基金
中国国家自然科学基金;
关键词
Data privacy; Protocols; Reliability; Privacy; Homomorphic encryption; Distributed databases; Computational modeling; Error detection; homomorphic encryption (HE); multisource data mining; privacy preservation; reliability; secure multiparty computation; ASSOCIATION RULES;
D O I
10.1109/TR.2023.3246563
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we address the problem of data privacy in multisource data mining. To do it, we present a new multiparty fully homomorphic encryption (MP-FHE) scheme, in which all participants are completely fair to perform the same computation. At first, the proposed MP-FHE scheme is divided into five stages (i.e., calculation, configuration, recombination, resharing, and reconstruction stage) to achieve the unified computation form of addition and multiplication. Meanwhile, random bivariate polynomials and commutative encryption are used to achieve the degree reduction of polynomials and the continuity of computation. Moreover, we prove that the scheme meets result consistency and program termination under the fail-stop adversary model. Especially, three kinds of error detection criteria are presented to find errors in three different stages (i.e., recombination, resharing, and reconstruction stage), which provides the monitor basis for the fail-stop adversary model. In addition, the MP-FHE scheme is applied into privacy preserving k-means clustering algorithm. Finally, we evaluate the computation and communication performance of our scheme from both theoretical and experimental aspects, and the evaluation results show that the scheme is efficient enough for multisource data mining.
引用
收藏
页码:1308 / 1323
页数:16
相关论文
共 50 条
  • [31] Privacy Preserving Data Aggregation in Fog Computing using Homomorphic Encryption: An Analysis
    Sendhil, R.
    Amuthan, A.
    2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 486 - +
  • [32] DPP: Data Privacy-Preserving for Cloud Computing based on Homomorphic Encryption
    Wang, Jing
    Wu, Fengheng
    Zhang, Tingbo
    Wu, Xiaohua
    2022 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, CYBERC, 2022, : 29 - 32
  • [33] Privacy-Preserving Blind Auction Protocol Using Fully Homomorphic Encryption
    Im, Jong-Hyuk
    Youn, Taek-Young
    Lee, Mun-Kyu
    ADVANCED SCIENCE LETTERS, 2016, 22 (09) : 2598 - 2600
  • [34] A New Model for Privacy Preserving Multiparty Collaborative Data Mining
    Bhanumathi, S.
    Sakthivel
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2013), 2013, : 845 - 850
  • [36] Practical Privacy-Preserving Data Science With Homomorphic Encryption: An Overview
    Iezzi, Michela
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 3979 - 3988
  • [37] Efran (Ω): "Efficient Scalar Homomorphic Scheme on MapReduce for Data Privacy Preserving"
    Martin, Konan
    Wang, Wenyong
    Agyemang, Brighter
    2016 IEEE 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2016, : 66 - 74
  • [38] Privacy-Preserving Deep Learning Model for Decentralized VANETs Using Fully Homomorphic Encryption and Blockchain
    Chen, Jianguo
    Li, Kenli
    Yu, Philip S.
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (08) : 11633 - 11642
  • [39] PPFLHE: A privacy-preserving federated learning scheme with homomorphic encryption for healthcare data
    Wang, Bo
    Li, Hongtao
    Guo, Yina
    Wang, Jie
    APPLIED SOFT COMPUTING, 2023, 146
  • [40] PRIVACY-PRESERVING PHISHING WEB PAGE CLASSIFICATION VIA FULLY HOMOMORPHIC ENCRYPTION
    Chou, Edward J.
    Gururajan, Arun
    Laine, Kim
    Goel, Nitin Kumar
    Bertiger, Anna
    Stokes, Jack W.
    2020 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2020, : 2792 - 2796