A Verifiable Privacy-Preserving Machine Learning Prediction Scheme for Edge-Enhanced HCPSs

被引:33
作者
Li, Xiong [1 ]
He, Jiabei [2 ]
Vijayakumar, Pandi [3 ]
Zhang, Xiaosong [1 ,4 ]
Chang, Victor [5 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Inst Cyber Secur, Chengdu 611731, Peoples R China
[2] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[3] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Tindivanam 604001, India
[4] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzhen 518040, Peoples R China
[5] Teesside Univ, Sch Comp & Digital Technol, Middlesbrough TS1 3BX, Cleveland, England
基金
中国国家自然科学基金;
关键词
Predictive models; Encryption; Privacy; Security; Computational modeling; Cryptography; Cloud computing; Batch verification; edge computing; human cyber-physical systems; Industry; 5; 0; machine learning (ML) prediction; privacy-preserving; EFFICIENT;
D O I
10.1109/TII.2021.3110808
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a highly integrated industrial system, human cyber-physical systems (HCPSs) provide accurate and high-quality services for Industry 5.0. In HCPSs, machine learning (ML) prediction provides reliable prediction results for users based on matured models, while security and privacy protection are considerable issues. In this article, based on the modified Okamoto-Uchiyama homomorphic encryption, we propose a verifiable privacy-preserving machine learning prediction scheme for the edge-enhanced HCPSs, which outputs the verifiable prediction results for users without privacy leakage. Specifically, a batch of prediction results can be verified at one time, which improves the efficiency of verification. Security analysis shows that our scheme protects the privacy of inputs, ML model, and prediction results. The experiment results demonstrate that the edge computing architecture remarkably alleviates the computational burden of the cloud server. Furthermore, compared with other related schemes, our scheme shows the best execution efficiency, and batch verification optimizes the performance by about 15% compared with single verification on the same scale.
引用
收藏
页码:5494 / 5503
页数:10
相关论文
共 26 条
[1]   A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems [J].
Arachchige, Pathum Chamikara Mahawaga ;
Bertok, Peter ;
Khalil, Ibrahim ;
Liu, Dongxi ;
Camtepe, Seyit ;
Atiquzzaman, Mohammed .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (09) :6092-6102
[2]   Practical Secure Aggregation for Privacy-Preserving Machine Learning [J].
Bonawitz, Keith ;
Ivanov, Vladimir ;
Kreuter, Ben ;
Marcedone, Antonio ;
McMahan, H. Brendan ;
Patel, Sarvar ;
Ramage, Daniel ;
Segal, Aaron ;
Seth, Karn .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1175-1191
[3]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[4]   Internet of Things (loT): A review of enabling technologies, challenges, and open research issues [J].
Colakovic, Alem ;
Hadzialic, Mesud .
COMPUTER NETWORKS, 2018, 144 :17-39
[5]  
Dayin Zhang, 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC). Proceedings, P652, DOI 10.1109/DSC.2018.00104
[6]  
Giry D., 2017, CRYPTOGRAPHIC KEYLEN
[7]   Applications of machine learning methods for engineering risk assessment - A review [J].
Hegde, Jeevith ;
Rokseth, Borge .
SAFETY SCIENCE, 2020, 122
[8]  
Kuri S, 2017, 2017 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), P1350
[9]   Privacy-preserving machine learning with multiple data providers [J].
Li, Ping ;
Li, Tong ;
Ye, Heng ;
Li, Jin ;
Chen, Xiaofeng ;
Xiang, Yang .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 :341-350
[10]   Multi-key privacy-preserving deep learning in cloud computing [J].
Li, Ping ;
Li, Jin ;
Huang, Zhengan ;
Li, Tong ;
Gao, Chong-Zhi ;
Yiu, Siu-Ming ;
Chen, Kai .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 74 :76-85