Secure and Evaluable Clustering Based on a Multifunctional and Privacy-Preserving Outsourcing Computation Toolkit

被引:0
|
作者
Li, Jialin [1 ]
Lu, Penghao [1 ]
Lin, Xuemin [1 ]
机构
[1] East China Normal Univ, Sch Software Engn, Shanghai 200062, Peoples R China
基金
中国国家自然科学基金; 上海市自然科学基金;
关键词
Outsourcing; Task analysis; Protocols; Servers; Privacy; Cloud computing; Clustering algorithms; Privacy-preserving; secure outsourcing computation; K-means; silhouette coefficient; CLOUD; CLASSIFICATION;
D O I
10.1109/ACCESS.2022.3166523
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although tremendous revolution has been made in the emerging cloud computing technologies over digital devices, privacy gradually becomes a big concern in outsourcing computation. Homomorphic encryption has been proposed to facilitate the preservation of data privacy while computational tasks being executed on ciphertext. However, many existing studies only support limited homomorphic calculation functions which barely satisfy complex computing tasks such as machine learning with massive computing resources and rich types of function. To address this problem, a novel multifunctional and privacy-preserving outsourcing computation toolkit is proposed in this paper, which supports several homomorphic computing protocols including division and power on ciphertext of integers and floating point numbers. Specifically, we first implement the homomorphic mutual conversion protocol between integer and floating point ciphertext to balance the efficiency and feasibility, considering the high-precision ciphertext operation on floating point numbers costs 100x computational overhead than that on integers. Second, we implement a homomorphic K-means algorithm based on our proposed toolkit for clustering and design the homomorphic silhouette coefficient as the evaluation index, thereby providing an informative cluster assessment for local users with limited resources. Then, we simulate the protocols of our proposed toolkit to explore the parameter sensitivity in terms of computational efficiency. Last, we report security analysis to prove the security of our toolkit without privacy leakage to unauthorized parties. Comprehensive experiments further demonstrate the efficiency and utility of our toolkit.
引用
收藏
页码:39407 / 39423
页数:17
相关论文
共 50 条
  • [1] A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment
    Liu, Zewei
    Hu, Chunqiang
    Li, Ruinian
    Xiang, Tao
    Li, Xingwang
    Yu, Jiguo
    Xia, Hui
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) : 2325 - 2336
  • [2] A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing
    Wei, Zhijun
    Li, Jing
    Wang, Xianmin
    Gao, Chong-Zhi
    [J]. IEEE ACCESS, 2019, 7 : 62785 - 62793
  • [3] Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation
    Schoenmakers, Berry
    Veeningen, Meilof
    de Vreede, Niels
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 346 - 366
  • [4] Maximized Privacy-Preserving Outsourcing on Support Vector Clustering
    Ping, Yuan
    Hao, Bin
    Hei, Xiali
    Wu, Jie
    Wang, Baocang
    [J]. ELECTRONICS, 2020, 9 (01)
  • [5] Privacy-Preserving Deep Learning Based on Multiparty Secure Computation: A Survey
    Zhang, Qiao
    Xin, Chunsheng
    Wu, Hongyi
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13): : 10412 - 10429
  • [6] Privacy-Preserving Outsourcing Computation of QR Decomposition in the Encrypted Domain
    Zhang, Yonghong
    Zheng, Peijia
    Luo, Weiqi
    [J]. 2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 389 - 396
  • [7] Fast Privacy-Preserving Text Classification Based on Secure Multiparty Computation
    Resende, Amanda
    Railsback, Davis
    Dowsley, Rafael
    Nascimento, Anderson C. A.
    Aranha, Diego E.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 428 - 442
  • [8] Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
    Chen, Fei
    Xiang, Tao
    Yang, Yuanyuan
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2014, 74 (03) : 2141 - 2151
  • [9] Secure multiparty computation for privacy-preserving drug discovery
    Ma, Rong
    Li, Yi
    Li, Chenxing
    Wan, Fangping
    Hu, Hailin
    Xu, Wei
    Zeng, Jianyang
    [J]. BIOINFORMATICS, 2020, 36 (09) : 2872 - 2880
  • [10] Privacy-preserving microbiome analysis using secure computation
    Wagner, Justin
    Paulson, Joseph N.
    Wang, Xiao
    Bhattacharjee, Bobby
    Bravo, Hector Corrada
    [J]. BIOINFORMATICS, 2016, 32 (12) : 1873 - 1879