Achieving Privacy-Preserving and Verifiable Support Vector Machine Training in the Cloud

被引:41
|
作者
Hu, Chenfei [1 ]
Zhang, Chuan [2 ,3 ]
Lei, Dian [4 ]
Wu, Tong [2 ]
Liu, Ximeng [5 ,6 ,7 ]
Zhu, Liehuang [2 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100081, Peoples R China
[2] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[3] Guangdong Prov Key Lab Novel Secur Intelligence Te, Shenzhen 518055, Peoples R China
[4] Lanzhou Univ, Sch Informat Sci & Engn, Lanzhou 730000, Peoples R China
[5] Singapore Management Univ, Sch Informat Syst, Singapore 188065, Singapore
[6] Fuzhou Univ, Coll Comp & Data Sci, Fuzhou 350025, Peoples R China
[7] Fujian Prov Key Lab Informat Secur Network Syst, Fuzhou 350025, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Privacy-preserving; support vector machine; data perturbation; homomorphic encryption; verification mechanism; PREDICTION SCHEME; EFFICIENT; SYSTEM;
D O I
10.1109/TIFS.2023.3283104
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the proliferation of machine learning, the cloud server has been employed to collect massive data and train machine learning models. Several privacy-preserving machine learning schemes have been suggested recently to guarantee data and model privacy in the cloud. However, these schemes either mandate the involvement of the data owner in model training or utilize high-cost cryptographic techniques, resulting in excessive computational and communication overheads. Furthermore, none of the existing work considers the malicious behavior of the cloud server during model training. In this paper, we propose the first privacy-preserving and verifiable support vector machine training scheme by employing a two-cloud platform. Specifically, based on the homomorphic verification tag, we design a verification mechanism to enable verifiable machine learning training. Meanwhile, to improve the efficiency of model training, we combine homomorphic encryption and data perturbation to design an efficient multiplication operation for the encryption domain. A rigorous theoretical analysis demonstrates the security and reliability of our scheme. The experimental results indicate that our scheme can reduce computational and communication overheads by at least 43.94% and 99.58%, respectively, compared to state-of-the-art SVM training methods.
引用
收藏
页码:3476 / 3491
页数:16
相关论文
共 50 条
  • [1] PTVC: Achieving Privacy-Preserving Trust-Based Verifiable Vehicular Cloud Computing
    Huang, Cheng
    Lu, Rongxing
    Zhu, Hui
    Hu, Hao
    Lin, Xiaodong
    [J]. 2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [2] An Efficient and Privacy-Preserving Outsourced Support Vector Machine Training for Internet of Medical Things
    Wang, Jing
    Wu, Libing
    Wang, Huaqun
    Choo, Kim-Kwang Raymond
    He, Debiao
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (01) : 458 - 473
  • [3] Privacy-Preserving Classification Scheme Based on Support Vector Machine
    Mao, Qinyu
    Chen, Yange
    Duan, Pu
    Zhang, Benyu
    Hong, Zhiyong
    Wang, Baocang
    [J]. IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 5906 - 5916
  • [4] Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud
    Rahulamathavan, Yogachandran
    Phan, Raphael C. -W.
    Veluru, Suresh
    Cumanan, Kanapathippillai
    Rajarajan, Muttukrishnan
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (05) : 467 - 479
  • [5] A Verifiable and Privacy-Preserving Federated Learning Training Framework
    Duan, Haohua
    Peng, Zedong
    Xiang, Liyao
    Hu, Yuncong
    Li, Bo
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 5046 - 5058
  • [6] Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing
    Zhang, Xiaoyu
    Chen, Xiaofeng
    Wang, Jianfeng
    Zhan, Zhihui
    Li, Jin
    [J]. SOFT COMPUTING, 2018, 22 (23) : 7719 - 7732
  • [7] Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing
    Xiaoyu Zhang
    Xiaofeng Chen
    Jianfeng Wang
    Zhihui Zhan
    Jin Li
    [J]. Soft Computing, 2018, 22 : 7719 - 7732
  • [8] Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
    Chen, Fei
    Xiang, Tao
    Yang, Yuanyuan
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2014, 74 (03) : 2141 - 2151
  • [9] Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environments
    Zhang, Chuan
    Hu, Chenfei
    Wu, Tong
    Zhu, Liehuang
    Liu, Ximeng
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4245 - 4257
  • [10] Privacy-Preserving Verifiable CNNs
    Attrapadung, Nuttapong
    Hanaoaka, Goichiro
    Hiromasa, Ryo
    Koseki, Yoshihiro
    Matsuda, Takahiro
    Nishida, Yutaro
    Sakai, Yusuke
    Schuldt, Jacob C. N.
    Yasuda, Satoshi
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT II, 2024, 14584 : 373 - 402