Outsourced privacy-preserving classification service over encrypted data

被引:46
|
作者
Li, Tong [1 ]
Huang, Zhengan [2 ]
Li, Ping [2 ]
Liu, Zheli [1 ]
Jia, Chunfu [1 ,3 ,4 ]
机构
[1] Nankai Univ, Coll Comp & Control Engn, Tianjin 300350, Peoples R China
[2] Guangzhou Univ, Sch Comp Sci, Guangzhou, Guangdong, Peoples R China
[3] Civil Aviat Univ China, Informat Secur Evaluat Ctr Civil Aviat, Tianjin, Peoples R China
[4] Key Lab High Trusted Informat Syst Hebei Prov, Baoding, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy preserving; Machine learning; Cloud service; BRANCHING PROGRAMS; BACKPROPAGATION; EFFICIENT;
D O I
10.1016/j.jnca.2017.12.021
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the diversity of cloud services, remote data services based on the machine learning classification have been provided in many applications including risk assessment and image recognition. In a classification service, a classifier owner that acts a service provider establishes a protocol to allow a user to query for the evaluation of his/her data. However, such an owner has to keep on-line continuously and equip with enough bandwidth and computing resources. Although the owner can outsource the service to a powerful service, there remains a challenge that is protecting the privacy of the data and the classifier. In this paper, we propose a novel scheme for a classifier owner to delegate a remote server to provide the privacy-preserving classification service for users. In the proposed scheme, we design efficient classification protocols for two concrete classifiers respectively. We implement the prototype of the scheme and conduct experiments. The experimental results show that the scheme is practical.
引用
收藏
页码:100 / 110
页数:11
相关论文
共 50 条
  • [41] Communication-efficient outsourced privacy-preserving classification service using trusted processor
    Li, Tong
    Li, Xuan
    Zhong, Xingyi
    Jiang, Nan
    Gao, Chong-zhi
    [J]. INFORMATION SCIENCES, 2019, 505 : 473 - 486
  • [42] Achieving Personalized and Privacy-Preserving Range Queries over Outsourced Cloud Data
    Shen, Yao
    Huang, Liusheng
    Yang, Wei
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [43] Lightweight and Privacy-Preserving Multi-Keyword Search over Outsourced Data
    Zhao, Meng
    Liu, Lingang
    Ding, Yong
    Deng, Hua
    Liang, Hai
    Wang, Huiyong
    Wang, Yujue
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (05):
  • [44] Efficient and Privacy-Preserving Online Fingerprint Authentication Scheme over Outsourced Data
    Zhu, Hui
    Wei, Qing
    Yang, Xiaopeng
    Lu, Rongxing
    Li, Hui
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (02) : 576 - 586
  • [45] Practical and Privacy-Preserving Policy Compliance for Outsourced Data
    Di Crescenzo, Giovanni
    Feigenbaum, Joan
    Gupta, Debayan
    Panagos, Euthimios
    Perry, Jason
    Wright, Rebecca N.
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2014 WORKSHOPS, BITCOIN AND WAHC 2014, 2014, 8438 : 181 - 194
  • [46] Efficient and Privacy-Preserving Query on Outsourced Spherical Data
    Zhou, Yueyue
    Xiang, Tao
    Li, Xiaoguo
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 138 - 152
  • [47] Privacy-Preserving GWAS Computation on Outsourced Data Encrypted under Multiple Keys Through Hybrid System
    Bomai, Abubakar
    Aldeen, Mohammed Shujaa
    Zhao, Chuan
    [J]. 2020 IEEE 7TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ADVANCED ANALYTICS (DSAA 2020), 2020, : 683 - 691
  • [48] Efficient and Privacy-Preserving Outsourced SVM Classification in Public Cloud
    Liang, Jinwen
    Qin, Zheng
    Ni, Jianbing
    Lin, Xiaodong
    Shen, Xuemin
    [J]. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [49] Privacy-preserving ranked neighbor query over encrypted graph data in the cloud
    Zhu, Hong
    Wu, Bin
    Xie, Meiyi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3167 - 3177
  • [50] Privacy-Preserving Complex Query Evaluation over Semantically Secure Encrypted Data
    Samanthula, Bharath Kumar
    Jiang, Wei
    Bertino, Elisa
    [J]. COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 400 - 418