Using Granule to Search Privacy Preserving Voice in Home IoT Systems

被引:12
作者
Li, Wei [1 ]
Chen, Yumin [1 ]
Hu, Huosheng [2 ]
Tang, Chao [3 ]
机构
[1] Xiamen Univ Technol, Sch Comp & Informat Engn, Xiamen 361024, Peoples R China
[2] Univ Essex, Sch Comp Sci & Elect Engn, Colchester CO4 3SQ, Essex, England
[3] Hefei Univ, Dept Comp Sci & Technol, Hefei 230601, Peoples R China
基金
中国国家自然科学基金;
关键词
Fuzzy search; granule computing; k-nearest neighbor; searchable encrypted voice; obfuscation function; ATTRIBUTE REDUCTION; ENCRYPTION; NETWORKS;
D O I
10.1109/ACCESS.2020.2972975
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Home IoT Voice System (HIVS) such as Amazon Alexa or Apple Siri can provide voice-based interfaces for people to conduct the search tasks using their voice. However, how to protect privacy is a big challenge. This paper proposes a novel personalized search scheme of encrypting voice with privacy-preserving by the granule computing technique. Firstly, Mel-Frequency Cepstrum Coefficients (MFCC) are used to extract voice features. These features are obfuscated by obfuscation function to protect them from being disclosed the server. Secondly, a series of definitions are presented, including fuzzy granule, fuzzy granule vector, ciphertext granule, operators and metrics. Thirdly, the AES method is used to encrypt voices. A scheme of searchable encrypted voice is designed by creating the fuzzy granule of obfuscation features of voices and the ciphertext granule of the voice. The experiments are conducted on corpus including English, Chinese and Arabic. The results show the feasibility and good performance of the proposed scheme.
引用
收藏
页码:31957 / 31969
页数:13
相关论文
共 59 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3621, P205
[2]   A k-mean clustering algorithm for mixed numeric and categorical data [J].
Ahmad, Amir ;
Dey, Lipika .
DATA & KNOWLEDGE ENGINEERING, 2007, 63 (02) :503-527
[3]  
[Anonymous], 1985, P IJCAI LOS ANG CA U
[4]  
[Anonymous], 2003, SECURE INDEXES
[5]  
[Anonymous], 1979, Advances in Fuzzy Set Theory and Applications, DOI DOI 10.1142/9789814261302_0022
[6]  
[Anonymous], [No title captured]
[7]  
[Anonymous], 2014, DATA CLASSIFICATION
[8]  
Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
[9]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[10]   VoiceGuard: Secure and Private Speech Processing [J].
Brasser, Ferdinand ;
Frassetto, Tommaso ;
Riedhammer, Korbinian ;
Sadeghi, Ahmad-Reza ;
Schneider, Thomas ;
Weinert, Christian .
19TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2018), VOLS 1-6: SPEECH RESEARCH FOR EMERGING MARKETS IN MULTILINGUAL SOCIETIES, 2018, :1303-1307