Efficient Multiparty Fully Homomorphic Encryption With Computation Fairness and Error Detection in Privacy Preserving Multisource Data Mining

被引:4
|
作者
Guo, Guanglai [1 ]
Zhu, Yan [1 ]
Chen, E. [1 ]
Yu, Ruyun [2 ]
Zhang, Lejun [3 ]
Lv, Kewei [4 ,5 ]
Feng, Rongquan [6 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[2] Cyberspace Secur Co Ltd, China Elect Technol Res Inst, Beijing 10085, Peoples R China
[3] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Peoples R China
[4] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100093, Peoples R China
[5] Chinese Acad Sci, Inst Informat Engn, Beijing 100193, Peoples R China
[6] Peking Univ, Sch Math Sci, Beijing 100871, Peoples R China
基金
中国国家自然科学基金;
关键词
Data privacy; Protocols; Reliability; Privacy; Homomorphic encryption; Distributed databases; Computational modeling; Error detection; homomorphic encryption (HE); multisource data mining; privacy preservation; reliability; secure multiparty computation; ASSOCIATION RULES;
D O I
10.1109/TR.2023.3246563
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we address the problem of data privacy in multisource data mining. To do it, we present a new multiparty fully homomorphic encryption (MP-FHE) scheme, in which all participants are completely fair to perform the same computation. At first, the proposed MP-FHE scheme is divided into five stages (i.e., calculation, configuration, recombination, resharing, and reconstruction stage) to achieve the unified computation form of addition and multiplication. Meanwhile, random bivariate polynomials and commutative encryption are used to achieve the degree reduction of polynomials and the continuity of computation. Moreover, we prove that the scheme meets result consistency and program termination under the fail-stop adversary model. Especially, three kinds of error detection criteria are presented to find errors in three different stages (i.e., recombination, resharing, and reconstruction stage), which provides the monitor basis for the fail-stop adversary model. In addition, the MP-FHE scheme is applied into privacy preserving k-means clustering algorithm. Finally, we evaluate the computation and communication performance of our scheme from both theoretical and experimental aspects, and the evaluation results show that the scheme is efficient enough for multisource data mining.
引用
收藏
页码:1308 / 1323
页数:16
相关论文
共 50 条
  • [41] Privacy-Preserving Linear Regression on Distributed Data by Homomorphic Encryption and Data Masking
    Qiu, Guowei
    Gui, Xiaolin
    Zhao, Yingliang
    IEEE ACCESS, 2020, 8 : 107601 - 107613
  • [42] Privacy Preserving Classification of EEG Data Using Machine Learning and Homomorphic Encryption
    Popescu, Andreea Bianca
    Taca, Ioana Antonia
    Nita, Cosmin Ioan
    Vizitiu, Anamaria
    Demeter, Robert
    Suciu, Constantin
    Itu, Lucian Mihai
    APPLIED SCIENCES-BASEL, 2021, 11 (16):
  • [43] A Fully Distributed Privacy-Preserving Energy Management System for Networked Microgrid Cluster Based on Homomorphic Encryption
    Yuan, Zhi-Peng
    Li, Peng
    Li, Zhen-Long
    Xia, Jing
    IEEE TRANSACTIONS ON SMART GRID, 2024, 15 (02) : 1735 - 1748
  • [44] Lattice-Based Homomorphic Encryption For Privacy-Preserving Smart Meter Data Analytics
    Marandi, Ali
    Alves, Pedro Geraldo M. R.
    Aranha, Diego F.
    Jacobsen, Rune Hylsberg
    COMPUTER JOURNAL, 2023, 67 (05) : 1687 - 1698
  • [45] Privacy-Preserving Search in Data Clouds Using Normalized Homomorphic Encryption
    Dawoud, Mohanad
    Altilar, D. Turgay
    EURO-PAR 2014: PARALLEL PROCESSING WORKSHOPS, PT II, 2014, 8806 : 62 - 72
  • [46] A Multilayer Evolutionary Homomorphic Encryption Approach for Privacy Preserving over Big Data
    Rahmani, Amine
    Amine, Abdelmalek
    Hamou, Reda Mohamed
    2014 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2014, : 19 - 26
  • [47] Power Consumption Data Privacy-preserving Scheme Based on Improved Multi-key Fully Homomorphic Encryption
    Li, Yuancheng
    Yu, Jiawen
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2021, 14 (05) : 564 - 574
  • [48] BlindFilter: Privacy-Preserving Spam Email Detection Using Homomorphic Encryption
    Lee, Dongwon
    Ahn, Myeonghwan
    Kwak, Hyesun
    Hong, Jin B.
    Kim, Hyoungshick
    2023 42ND INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, SRDS 2023, 2023, : 35 - 45
  • [49] Privacy-Preserving IoT Data Aggregation Based on Blockchain and Homomorphic Encryption
    Loukil, Faiza
    Ghedira-Guegan, Chirine
    Boukadi, Khouloud
    Benharkat, Aicha-Nabila
    SENSORS, 2021, 21 (07)
  • [50] Fully Homomorphic Encryption: An Antidote to Cloud Data Security and Privacy Concerns.
    Jubrin, Abdulahi Monday
    Izegbu, Ikechukwu
    Adebayo, Olawale Surajudeen
    2019 15TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION (ICECCO), 2019,