Privacy-Preserving SVM Computing in the Encrypted Domain

被引:0
|
作者
Maekawa, Takahiro [1 ]
Kawamura, Ayana [1 ]
Kinoshita, Yuma [1 ]
Kiya, Hitoshi [1 ]
机构
[1] Tokyo Metropolitan Univ, Tokyo 1910065, Japan
关键词
Support Vector Machine; Privacy-preserving; EtC images; THEN-COMPRESSION SYSTEM; RECOGNITION; PROTECTION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Privacy-preserving Support Vector Machine (SVM) computing scheme is proposed in this paper. Cloud computing has been spreading in many fields. However, the cloud computing has some serious issues for end users, such as unauthorized use and leak of data, and privacy compromise. We focus on templates protected by a block scrambling-based encryption scheme, and consider some properties of the protected templates for secure SVM computing, where templates mean features extracted from data. The proposed scheme enables us not only to protect templates, but also to have the same performance as that of unprotected templates under some useful kernel functions. Moreover, it can be directly carried out by using well-known SVM algorithms, without preparing any algorithms specialized for secure SVM computing. In an experiment, the pfroposed scheme is applied to a face-based authentication algorithm with SVM classifiers to confirm the effectiveness.
引用
收藏
页码:897 / 902
页数:6
相关论文
共 50 条
  • [21] Advances in privacy-preserving computing
    Xue, Kaiping
    Liu, Zhe
    Zhu, Haojin
    Pan, Miao
    Wei, David S. L.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (03) : 1348 - 1352
  • [22] Efficient and Privacy-Preserving Categorization for Encrypted EMR
    Zhao, Zhiliang
    Zeng, Shengke
    Cheng, Shuai
    Hao, Fei
    MATHEMATICS, 2023, 11 (03)
  • [23] Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing
    Cao, Ning
    Yang, Zhenyu
    Wang, Cong
    Ren, Kui
    Lou, Wenjing
    31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, : 393 - 402
  • [24] EViT: Privacy-Preserving Image Retrieval via Encrypted Vision Transformer in Cloud Computing
    Feng Q.
    Li P.
    Lu Z.
    Li C.
    Wang Z.
    Liu Z.
    Duan C.
    Huang F.
    Weng J.
    Y P.S.
    IEEE Transactions on Circuits and Systems for Video Technology, 2024, 34 (08) : 1 - 1
  • [25] Privacy-Preserving Keyword Similarity Search Over Encrypted Spatial Data in Cloud Computing
    Song, Fuyuan
    Qin, Zheng
    Xue, Liang
    Zhang, Jixin
    Lin, Xiaodong
    Shen, Xuemin
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (08) : 6184 - 6198
  • [26] PRIVACY-PRESERVING DISTRIBUTED SPEECH ENHANCEMENT FOR WIRELESS SENSOR NETWORKS BY PROCESSING IN THE ENCRYPTED DOMAIN
    Hendriks, Richard C.
    Erkin, Zekeriya
    Gerkmann, Timo
    2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2013, : 7005 - 7009
  • [27] Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain
    Jiang, Linzhi
    Xu, Chunxiang
    Wang, Xiaofang
    Luo, Bo
    Wang, Huaqun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (01) : 179 - 193
  • [28] Encrypted Image Feature Extraction By Privacy-Preserving MFS
    Chen, Guoming
    Chen, Qiang
    Zhu, Xiongyong
    Chen, Yiqun
    2018 7TH INTERNATIONAL CONFERENCE ON DIGITAL HOME (ICDH 2018), 2018, : 42 - 45
  • [29] A Privacy-Preserving Infrastructure to Monitor Encrypted DNS Logs
    Abdel-Rahman, Adam Oumar
    Levillain, Olivier
    Totel, Eric
    RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2023, 2023, 14529 : 185 - 199
  • [30] Privacy-Preserving Similarity Joins Over Encrypted Data
    Yuan, Xingliang
    Wang, Xinyu
    Wang, Cong
    Yu, Chenyun
    Nutanong, Sarana
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (11) : 2763 - 2775