Secure and Evaluable Clustering Based on a Multifunctional and Privacy-Preserving Outsourcing Computation Toolkit

被引:0
|
作者
Li, Jialin [1 ]
Lu, Penghao [1 ]
Lin, Xuemin [1 ]
机构
[1] East China Normal Univ, Sch Software Engn, Shanghai 200062, Peoples R China
基金
上海市自然科学基金; 中国国家自然科学基金;
关键词
Outsourcing; Task analysis; Protocols; Servers; Privacy; Cloud computing; Clustering algorithms; Privacy-preserving; secure outsourcing computation; K-means; silhouette coefficient; CLOUD; CLASSIFICATION;
D O I
10.1109/ACCESS.2022.3166523
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Although tremendous revolution has been made in the emerging cloud computing technologies over digital devices, privacy gradually becomes a big concern in outsourcing computation. Homomorphic encryption has been proposed to facilitate the preservation of data privacy while computational tasks being executed on ciphertext. However, many existing studies only support limited homomorphic calculation functions which barely satisfy complex computing tasks such as machine learning with massive computing resources and rich types of function. To address this problem, a novel multifunctional and privacy-preserving outsourcing computation toolkit is proposed in this paper, which supports several homomorphic computing protocols including division and power on ciphertext of integers and floating point numbers. Specifically, we first implement the homomorphic mutual conversion protocol between integer and floating point ciphertext to balance the efficiency and feasibility, considering the high-precision ciphertext operation on floating point numbers costs 100x computational overhead than that on integers. Second, we implement a homomorphic K-means algorithm based on our proposed toolkit for clustering and design the homomorphic silhouette coefficient as the evaluation index, thereby providing an informative cluster assessment for local users with limited resources. Then, we simulate the protocols of our proposed toolkit to explore the parameter sensitivity in terms of computational efficiency. Last, we report security analysis to prove the security of our toolkit without privacy leakage to unauthorized parties. Comprehensive experiments further demonstrate the efficiency and utility of our toolkit.
引用
收藏
页码:39407 / 39423
页数:17
相关论文
共 50 条
  • [31] Privacy-preserving kernel k-means clustering outsourcing with random transformation
    Keng-Pei Lin
    [J]. Knowledge and Information Systems, 2016, 49 : 885 - 908
  • [33] Privacy-preserving distributed clustering
    Erkin, Zekeriya
    Veugen, Thijs
    Toft, Tomas
    Lagendijk, Reginald L.
    [J]. EURASIP JOURNAL ON INFORMATION SECURITY, 2013, (01):
  • [34] Privacy-Preserving Photo Sharing based on a Secure JPEG
    Yuan, Lin
    Korshunov, Pavel
    Ebrahimi, Touradj
    [J]. 2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2015, : 185 - 190
  • [35] Secure and Privacy-preserving Biometrics based Active Authentication
    Sui, Yan
    Zou, Xukai
    Du, Eliza Y.
    Li, Feng
    [J]. PROCEEDINGS 2012 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2012, : 1291 - 1296
  • [36] Secure Privacy-Preserving Protocols for Outsourcing Continuous Authentication of Smartphone Users with Touch Data
    Govindarajan, Sathya
    Gasti, Paolo
    Balagani, Kiran S.
    [J]. 2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON BIOMETRICS: THEORY, APPLICATIONS AND SYSTEMS (BTAS), 2013,
  • [37] Secure Multi-Party Computation-Based Privacy-Preserving Authentication for Smart Cities
    Sucasas, Victor
    Aly, Abdelrahaman
    Mantas, Georgios
    Rodriguez, Jonathan
    Aaraj, Najwa
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (04) : 3555 - 3572
  • [38] Secure Outsourcing Algorithm for Signature Generation in Privacy-Preserving Public Cloud Storage Auditing
    Zhao, Pu
    Yu, Jia
    Zhang, Hanlin
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2019, 35 (03) : 635 - 650
  • [39] Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain
    Jiang, Linzhi
    Xu, Chunxiang
    Wang, Xiaofang
    Luo, Bo
    Wang, Huaqun
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (01) : 179 - 193
  • [40] Outsourcing Privacy-Preserving Social Networks to a Cloud
    Wang, Guojun
    Liu, Qin
    Li, Feng
    Yang, Shuhui
    Wu, Jie
    [J]. 2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2886 - 2894