Privacy-preserving multikey computing framework for encrypted data in the cloud

被引:8
作者
Zhang, Jun [1 ]
Jiang, Zoe L. [2 ]
Li, Ping [3 ]
Yiu, Siu Ming [4 ]
机构
[1] Shenzhen Univ, Shenzhen, Guangdong, Peoples R China
[2] Harbin Inst Technol Shenzhen, Shenzhen, Guangdong, Peoples R China
[3] South China Normal Univ, Guangzhou, Guangdong, Peoples R China
[4] Univ Hong Kong, Pokfulam Rd, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy-preserving computing framework; Cloud computing; Homomorphic encryption; Multiple keys; SECURE;
D O I
10.1016/j.ins.2021.06.017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Preparing large amounts of training data is the key to the success of machine learning. Due to the public's concern about individual privacy, different techniques are proposed to achieve privacy preserving machine learning. Homomorphic encryption enables calculation on encrypted data in the cloud. However, current schemes either focus on single key or a specific algorithm. Cooperation between different institutions is quite common in this era of big data. Encrypting data from different institutions under one single key is a risk to data privacy. Moreover, constructing secure scheme for a specific machine learning algorithm lacks universality. Based on an additively homomorphic encryption supporting one multiplication, we propose a general multikey computing framework to execute common arithmetic operations on encrypted data such as addition, multiplication, comparison, sorting, division and etc. Our scheme can be used to run different machine learning algorithms. Our scheme is proven to be secure against semi-honest attackers and the experimental evaluations demonstrate the practicality of our computing framework. (c) 2021 Elsevier Inc. All rights reserved.
引用
收藏
页码:217 / 230
页数:14
相关论文
共 39 条
[1]   Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP [J].
Brakerski, Zvika .
ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 :868-886
[2]  
Bresson E, 2003, LECT NOTES COMPUT SC, V2894, P37
[3]   Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data [J].
Catalano, Dario ;
Fiore, Dario .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :1518-1529
[4]   Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference [J].
Chen, Hao ;
Dai, Wei ;
Kim, Miran ;
Song, Yongsoo .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :395-412
[5]   Homomorphic Encryption for Arithmetic of Approximate Numbers [J].
Cheon, Jung Hee ;
Kim, Andrey ;
Kim, Miran ;
Song, Yongsoo .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I, 2017, 10624 :409-437
[6]   Cloud Infrastructure Resource Allocation for Big Data Applications [J].
Dai, Wenyun ;
Qiu, Longfei ;
Wu, Ana ;
Qiu, Meikang .
IEEE TRANSACTIONS ON BIG DATA, 2018, 4 (03) :313-324
[7]   Who Moved My Data? Privacy Protection in Smartphones [J].
Dai, Wenyun ;
Qiu, Meikang ;
Qiu, Longfei ;
Chen, Longbin ;
Wu, Ana .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (01) :20-25
[8]  
Dowlin N, 2016, PR MACH LEARN RES, V48
[9]  
Goldreich O., 2004, Foundations of Cryptography, VVolume 2, DOI DOI 10.1017/CBO9780511721656
[10]   Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases [J].
Huang, Cheng ;
Lu, Rongxing ;
Choo, Kim-Kwang Raymond .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2017, 89 :51-63