Privacy-preserving multikey computing framework for encrypted data in the cloud

被引:8
|
作者
Zhang, Jun [1 ]
Jiang, Zoe L. [2 ]
Li, Ping [3 ]
Yiu, Siu Ming [4 ]
机构
[1] Shenzhen Univ, Shenzhen, Guangdong, Peoples R China
[2] Harbin Inst Technol Shenzhen, Shenzhen, Guangdong, Peoples R China
[3] South China Normal Univ, Guangzhou, Guangdong, Peoples R China
[4] Univ Hong Kong, Pokfulam Rd, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy-preserving computing framework; Cloud computing; Homomorphic encryption; Multiple keys; SECURE;
D O I
10.1016/j.ins.2021.06.017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Preparing large amounts of training data is the key to the success of machine learning. Due to the public's concern about individual privacy, different techniques are proposed to achieve privacy preserving machine learning. Homomorphic encryption enables calculation on encrypted data in the cloud. However, current schemes either focus on single key or a specific algorithm. Cooperation between different institutions is quite common in this era of big data. Encrypting data from different institutions under one single key is a risk to data privacy. Moreover, constructing secure scheme for a specific machine learning algorithm lacks universality. Based on an additively homomorphic encryption supporting one multiplication, we propose a general multikey computing framework to execute common arithmetic operations on encrypted data such as addition, multiplication, comparison, sorting, division and etc. Our scheme can be used to run different machine learning algorithms. Our scheme is proven to be secure against semi-honest attackers and the experimental evaluations demonstrate the practicality of our computing framework. (c) 2021 Elsevier Inc. All rights reserved.
引用
收藏
页码:217 / 230
页数:14
相关论文
共 50 条
  • [1] Privacy-preserving Association Rule Mining Algorithm for Encrypted Data in Cloud Computing
    Kim, Hyeong-Jin
    Shin, Jae-Hwan
    Song, Young-ho
    Chang, Jae-Woo
    2019 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (IEEE CLOUD 2019), 2019, : 487 - 489
  • [2] An efficient privacy-preserving rank query over encrypted data in cloud computing
    Cheng, Fang-Quan
    Peng, Zhi-Yong
    Song, Wei
    Wang, Shu-Lin
    Cui, Yi-Hui
    Jisuanji Xuebao/Chinese Journal of Computers, 2012, 35 (11): : 2215 - 2227
  • [3] Privacy-Preserving Pattern Matching over Encrypted Genetic Data in Cloud Computing
    Wang, Bing
    Song, Wei
    Lou, Wenjing
    Hou, Y. Thomas
    IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2017,
  • [4] A privacy-preserving cross-media retrieval on encrypted data in cloud computing
    Wang, Zhangdong
    Qin, Jiaohua
    Xiang, Xuyu
    Tan, Yun
    Peng, Jia
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 73
  • [5] Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing
    Samanthula, Bharath K.
    Jiang, Wei
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013), 2013, : 51 - 58
  • [6] QSDB: An Encrypted Database Model for Privacy-Preserving in Cloud Computing
    Liu, Guoxiu
    Yang, Geng
    Wang, Haiwei
    Dai, Hua
    Zhou, Qiang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (07): : 3375 - 3400
  • [7] Privacy-preserving query over the encrypted image in cloud computing
    Zhu, Xudong
    Li, Hui
    Guo, Zhen
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2014, 41 (02): : 151 - 158
  • [8] Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing
    Cao, Ning
    Yang, Zhenyu
    Wang, Cong
    Ren, Kui
    Lou, Wenjing
    31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, : 393 - 402
  • [9] Privacy-Preserving Keyword Similarity Search Over Encrypted Spatial Data in Cloud Computing
    Song, Fuyuan
    Qin, Zheng
    Xue, Liang
    Zhang, Jixin
    Lin, Xiaodong
    Shen, Xuemin
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (08) : 6184 - 6198
  • [10] Privacy-Preserving Data Sharing in Cloud Computing
    王慧
    JournalofComputerScience&Technology, 2010, 25 (03) : 401 - 414