A PROPOSAL OF PROFIT SHARING METHOD FOR SECURE MULTIPARTY COMPUTATION

被引:3
作者
Miyajima, Hirofumi [1 ]
Shigei, Noritaka [2 ]
Miyajima, Hiromi [2 ]
Shiratori, Norio [3 ]
机构
[1] Okayama Univ Sci, Fac Informat, Kita Ku, 1-1 Ridaicho, Okayama, Okayama 7000005, Japan
[2] Kagoshima Univ, Grad Sch Sci & Engn, 1-21-24 Korimoto, Kagoshima, Kagoshima 8900065, Japan
[3] Chuo Univ, Res & Dev Initiat, Bunkyo Ku, 1-13-27 Kasuga, Tokyo 1128551, Japan
来源
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL | 2018年 / 14卷 / 02期
关键词
Cloud computing; Secure multiparty computation; Reinforcement learning;
D O I
10.24507/ijicic.14.02.727
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Many studies for secure computation using shared data on the cloud system are made to avoid secure risks being abused or leaked and to reduce computing cost. The secure multiparty computation (SMC) is one of these methods. There are two methods for constructing a machine learning (ML) based on SMC. One is a method of sharing learning data into several subsets and learning at each server. The other method is to divide the learning data itself and learn by using each server. In the latter, we have proposed learning methods of BP, k-means and fuzzy inference about SMC so far. Further, we proposed a learning method of SMC on Q-learning which is one of reinforcement learning methods, and showed its effectiveness in the previous paper. Though Q-learning is a learning method with excellent generalization ability, it is known that it takes much time to learn. On the other hand, the profit sharing (PS) method is known to have a shorter learning time than Q-learning. Therefore, it is desired that PS learning method for SMC is superior in learning time to Q-learning method for SMC. In this paper, we propose PS learning method on SMC and show its effectiveness.
引用
收藏
页码:727 / 735
页数:9
相关论文
共 16 条
  • [1] Beimel A., 2011, P 3 INT C COD CRYPT
  • [2] Canetti R., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P639, DOI 10.1145/237814.238015
  • [3] Secure Multi-party Computation Based Privacy Preserving Extreme Learning Machine Algorithm Over Vertically Distributed Data
    Catak, Ferhat Ozgur
    [J]. NEURAL INFORMATION PROCESSING, PT II, 2015, 9490 : 337 - 345
  • [4] Chida K., 2011, J INFORM PROCESSING, V52, P2674
  • [5] Cramer R., 2000, P INT C THEOR APPL C
  • [6] Miyajima Hirofumi, 2016, IAENG International Journal of Computer Science, V43, P270
  • [7] Miyajima H., 2017, ARTIF INTELL RES, V6, P57
  • [8] Miyajima H., 2017, NEW PRIVACY PRESERVI, V6
  • [9] New Methods to Ensure Security to Increase User's Sense of Safety in Cloud Services
    Miyanishi, Yohtaro
    Kanaoka, Akira
    Sato, Fumiaki
    Han, Xiaogong
    Kitagami, Shinji
    Urano, Yoshiyori
    Shiratori, Norio
    [J]. 2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 859 - 866
  • [10] Miyazaki K., 1997, Journal of Japanese Society for Artificial Intelligence, V12, P78