Using Granule to Search Privacy Preserving Voice in Home IoT Systems

被引:12
作者
Li, Wei [1 ]
Chen, Yumin [1 ]
Hu, Huosheng [2 ]
Tang, Chao [3 ]
机构
[1] Xiamen Univ Technol, Sch Comp & Informat Engn, Xiamen 361024, Peoples R China
[2] Univ Essex, Sch Comp Sci & Elect Engn, Colchester CO4 3SQ, Essex, England
[3] Hefei Univ, Dept Comp Sci & Technol, Hefei 230601, Peoples R China
基金
中国国家自然科学基金;
关键词
Fuzzy search; granule computing; k-nearest neighbor; searchable encrypted voice; obfuscation function; ATTRIBUTE REDUCTION; ENCRYPTION; NETWORKS;
D O I
10.1109/ACCESS.2020.2972975
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Home IoT Voice System (HIVS) such as Amazon Alexa or Apple Siri can provide voice-based interfaces for people to conduct the search tasks using their voice. However, how to protect privacy is a big challenge. This paper proposes a novel personalized search scheme of encrypting voice with privacy-preserving by the granule computing technique. Firstly, Mel-Frequency Cepstrum Coefficients (MFCC) are used to extract voice features. These features are obfuscated by obfuscation function to protect them from being disclosed the server. Secondly, a series of definitions are presented, including fuzzy granule, fuzzy granule vector, ciphertext granule, operators and metrics. Thirdly, the AES method is used to encrypt voices. A scheme of searchable encrypted voice is designed by creating the fuzzy granule of obfuscation features of voices and the ciphertext granule of the voice. The experiments are conducted on corpus including English, Chinese and Arabic. The results show the feasibility and good performance of the proposed scheme.
引用
收藏
页码:31957 / 31969
页数:13
相关论文
共 59 条
[51]  
Yager RR, 1998, 1998 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AT THE IEEE WORLD CONGRESS ON COMPUTATIONAL INTELLIGENCE - PROCEEDINGS, VOL 1-2, P123, DOI 10.1109/FUZZY.1998.687470
[52]  
Yang M, 2012, PROC CVPR IEEE, P2224, DOI 10.1109/CVPR.2012.6247931
[53]   Stratified sampling for feature subspace selection in random forests for high dimensional data [J].
Ye, Yunming ;
Wu, Qingyao ;
Huang, Joshua Zhexue ;
Ng, Michael K. ;
Li, Xutao .
PATTERN RECOGNITION, 2013, 46 (03) :769-787
[54]   Toward a theory of fuzzy information granulation and its centrality in human reasoning and fuzzy logic [J].
Zadeh, LA .
FUZZY SETS AND SYSTEMS, 1997, 90 (02) :111-127
[55]  
Zalewski J., 1996, CONTROL ENG PRACT, V4, P741, DOI [10.1016/S0967-0661(96)90021-0, DOI 10.1016/S0967-0661(96)90021-0]
[56]  
Zhang Bo., 1992, THEORY APPL PROBLEM
[57]   Locally Discriminative Coclustering [J].
Zhang, Lijun ;
Chen, Chun ;
Bu, Jiajun ;
Chen, Zhengguang ;
Cai, Deng ;
Han, Jiawei .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2012, 24 (06) :1025-1035
[58]   FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things [J].
Zhang, Xiaojun ;
Xu, Chunxiang ;
Wang, Huaxiong ;
Zhang, Yuan ;
Wang, Shixiong .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) :1019-1032
[59]   Personalized Mobile Searching Approach Based on Combining Content-Based Filtering and Collaborative Filtering [J].
Zhao, Feng ;
Yan, Fengwei ;
Jin, Hai ;
Yang, Laurence T. ;
Yu, Chen .
IEEE SYSTEMS JOURNAL, 2017, 11 (01) :324-332