Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing

被引:19
|
作者
Zhang, Xiaoyu [1 ]
Chen, Xiaofeng [1 ]
Wang, Jianfeng [1 ]
Zhan, Zhihui [2 ]
Li, Jin [3 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian 710071, Shaanxi, Peoples R China
[2] South China Univ Technol, Sch Comp Sci & Engn, Guangdong Prov Key Lab Computat Intelligence & Cy, Guangzhou 510006, Guangdong, Peoples R China
[3] Guangzhou Univ, Sch Computat Sci & Educ Software, Guangzhou 510006, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Single-layer perceptron; Privacy preservation; Batch training; Verifiability; Cloud computing; COMPUTATION; ALGORITHMS; EFFICIENT; SECURITY; DATABASE;
D O I
10.1007/s00500-018-3233-7
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the advent of artificial intelligence, machine learning has been well explored and extensively applied into numerous fields, such as pattern recognition, image processing and cloud computing. Very recently, machine learning hosted in a cloud service has gained more attentions due to the benefits from the outsourcing paradigm. Based on cloud-aided computation techniques, the heavy computation tasks involved in machine learning process can be off-loaded into the cloud server in a pay-per-use manner, whereas outsourcing large-scale collection of sensitive data risks privacy leakage since the cloud server is semi-honest. Therefore, privacy preservation for the client and verification for the returned results become two challenges to be dealt with. In this paper, we focus on designing a novel privacy-preserving single-layer perceptron training scheme which supports batch patterns training and verification for the training results on the client side. In addition, adopting classical secure two-party computation method, we design a novel lightweight privacy-preserving predictive algorithm. Both two participants learns nothing about other's inputs, and the calculation result is only known by one party. Detailed security analysis shows that the proposed scheme can achieve the desired security properties. We also demonstrate the efficiency of our scheme by providing the experimental evaluation on two different real datasets.
引用
收藏
页码:7719 / 7732
页数:14
相关论文
共 50 条
  • [1] Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing
    Xiaoyu Zhang
    Xiaofeng Chen
    Jianfeng Wang
    Zhihui Zhan
    Jin Li
    [J]. Soft Computing, 2018, 22 : 7719 - 7732
  • [2] EPSLP: Efficient and privacy-preserving single-layer perceptron learning in cloud computing
    Wang, Jingjing
    Zhang, Xiaoyu
    Tao, Xiaoling
    Wang, Jianfeng
    [J]. JOURNAL OF HIGH SPEED NETWORKS, 2018, 24 (03) : 259 - 279
  • [3] PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare
    Wang, Guoming
    Lu, Rongxing
    Huang, Cheng
    [J]. 2015 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2015,
  • [4] Verifiable privacy-preserving semantic retrieval scheme in the edge computing
    Guo, Jiaqi
    Tian, Cong
    He, Qiang
    Zhao, Liang
    Duan, Zhenhua
    [J]. Journal of Systems Architecture, 2024, 156
  • [5] A Privacy-Preserving Access Control Scheme with Verifiable and Outsourcing Capabilities in Fog-Cloud Computing
    Cheng, Zhen
    Zhang, Jiale
    Qian, Hongyan
    Xiang, Mingrong
    Wu, Di
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING (ICA3PP 2019), PT I, 2020, 11944 : 345 - 358
  • [6] Achieving Privacy-Preserving and Verifiable Support Vector Machine Training in the Cloud
    Hu, Chenfei
    Zhang, Chuan
    Lei, Dian
    Wu, Tong
    Liu, Ximeng
    Zhu, Liehuang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3476 - 3491
  • [7] A Privacy-Preserving and Verifiable Federated Learning Scheme
    Zhang, Xianglong
    Fu, Anmin
    Wang, Huaqun
    Zhou, Chunyi
    Chen, Zhenzhu
    [J]. ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [8] VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems
    Zhang, Jiale
    Liu, Yue
    Wu, Di
    Lou, Shuai
    Chen, Bing
    Yu, Shui
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2023, 9 (04) : 981 - 989
  • [9] An Improved Privacy-Preserving Biometric Identification Scheme in Cloud Computing
    Huang, Kai
    Xu, Ming
    Fu, Shaojing
    Luo, Yuchuan
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (10) : 1891 - 1894
  • [10] A verifiable and privacy-preserving cloud mining pool selection scheme in blockchain of things
    Zhang, Mingwu
    Yang, Mingxuan
    Shen, Gang
    Xia, Zhe
    Wang, Yuntao
    [J]. INFORMATION SCIENCES, 2023, 623 : 293 - 310