Secure and Non-interactive k-NN Classifier Using Symmetric Fully Homomorphic Encryption

被引:0
|
作者
Ameur, Yulliwas [1 ]
Aziz, Rezak [1 ]
Audigier, Vincent [1 ]
Bouzefrane, Samia [1 ]
机构
[1] Cnam, CEDRIC Lab, 292 Rue St Martin, F-75141 Paris, France
来源
关键词
k-nearest neighbors; Homomorphic encryption; TFHE; Data privacy; IoT; Cloud computing; Privacy-preserving;
D O I
10.1007/978-3-031-13945-1_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
"Machine learning as a service" (MLaaS) in the cloud accelerates the adoption of machine learning techniques. Nevertheless, the externalization of data on the cloud raises a serious vulnerability issue because it requires disclosing private data to the cloud provider. This paper deals with this problem and brings a solution for the K-nearest neighbors (k-NN) algorithm with a homomorphic encryption scheme (called TFHE) by operating on end-to-end encrypted data while preserving privacy. The proposed solution addresses all stages of k-NN algorithm with fully encrypted data, including the majority vote for the class-label assignment. Unlike existing techniques, our solution does not require intermediate interactions between the server and the client when executing the classification task. Our algorithm has been assessed with quantitative variables and has demonstrated its efficiency on large and relevant real-world data sets while scaling well across different parameters on simulated data.
引用
收藏
页码:142 / 154
页数:13
相关论文
共 50 条
  • [1] Non-interactive Privacy-preserving k-NN Classifier
    Pereira, Hilder V. L.
    Aranha, Diego F.
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 362 - 371
  • [2] Secure Optimal k-NN on Encrypted Cloud Data using Homomorphic Encryption with Query Users
    Shankar, K.
    Ilayaraja, M.
    2018 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2018,
  • [3] Non-interactive zero-knowledge from homomorphic encryption
    Damgard, Ivan
    Fazio, Nelly
    Nicolosi, Antonio
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 41 - 59
  • [4] Non-interactive quantum homomorphic encryption scheme based on the rotation operator
    Wang, ShuoLin
    Shang, Tao
    Liu, JianWei
    SCIENTIA SINICA-PHYSICA MECHANICA & ASTRONOMICA, 2023, 53 (04)
  • [5] Secure Signal Processing Using Fully Homomorphic Encryption
    Shortell, Thomas
    Shokoufandeh, Ali
    ADVANCED CONCEPTS FOR INTELLIGENT VISION SYSTEMS, ACIVS 2015, 2015, 9386 : 93 - 104
  • [6] Secure signal processing using fully homomorphic encryption
    Shortell, Thomas
    Shokoufandeh, Ali
    IET INFORMATION SECURITY, 2020, 14 (01) : 51 - 59
  • [7] Secure Similarity Joins Using Fully Homomorphic Encryption
    Cruz, Mateus S. H.
    Amagasa, Toshiyuki
    Watanabe, Chiemi
    Lu, Wenjie
    Kitagawa, Hiroyuki
    19TH INTERNATIONAL CONFERENCE ON INFORMATION INTEGRATION AND WEB-BASED APPLICATIONS & SERVICES (IIWAS2017), 2017, : 224 - 233
  • [8] Secure Face Matching Using Fully Homomorphic Encryption
    Boddeti, Vishnu Naresh
    2018 IEEE 9TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS), 2018,
  • [9] Non-interactive and Output Expressive Private Comparison from Homomorphic Encryption
    Lu, Wen-jie
    Zhou, Jun-jie
    Sakuma, Jun
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 67 - 73
  • [10] HUMAN ACTION ANALYSIS USING K-NN CLASSIFIER
    Akilandasowmya, G.
    Sathiya, P.
    AnandhaKumar, P.
    2015 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2015,