Privacy preserving Cloud-based Quadratic Optimization

被引:0
|
作者
Alexandru, Andreea B. [1 ]
Gatsis, Konstantinos [1 ]
Pappas, George J. [1 ]
机构
[1] Univ Penn, Dept Elect Syst Engn, Philadelphia, PA 19104 USA
关键词
SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work proposes a protocol for privately solving constrained quadratic optimization problems with sensitive data. The problem encompasses the private data of multiple agents and is outsourced to an untrusted server. We describe the desired security goals and investigate the information leakage from duality theory. We present an interactive protocol that achieves the solution of a strictly quadratic convex optimization problem with private linear cost and private linear inequality constraints, by making use of partially homomorphic cryptosystems to securely effectuate computations. Then, we provide extensions to the protocol in order to also consider equality constraints and to obtain a speedup of the performance.
引用
收藏
页码:1168 / 1175
页数:8
相关论文
共 50 条
  • [1] On the security of randomly transformed quadratic programs for privacy-preserving cloud-based control
    Binfet, Philipp
    Schluter, Nils
    Darup, Moritz Schulze
    [J]. 2023 62ND IEEE CONFERENCE ON DECISION AND CONTROL, CDC, 2023, : 3872 - 3877
  • [2] PRIVACY-PRESERVING CLOUD-BASED DNN INFERENCE
    Xie, Shangyu
    Liu, Bingyu
    Hong, Yuan
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, : 2675 - 2679
  • [3] Preserving user query privacy in cloud-based security services
    Chen, Yen-Chung
    Wu, Yu-Sung
    Tzeng, Wen-Guey
    [J]. JOURNAL OF COMPUTER SECURITY, 2014, 22 (06) : 997 - 1024
  • [4] BigBing: Privacy -Preserving Cloud-Based Malware Classification Service
    Kucuk, Yunus
    Patil, Nikhil
    Shu, Zhan
    Yan, Guanhua
    [J]. 2018 IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), 2018, : 43 - 54
  • [5] A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration
    Dubovitskaya, Alevtina
    Urovi, Visara
    Vasirani, Matteo
    Aberer, Karl
    Schumacher, Michael I.
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 585 - 598
  • [6] PriMal: Cloud-Based Privacy-Preserving Malware Detection
    Sun, Hao
    Su, Jinshu
    Wang, Xiaofeng
    Chen, Rongmao
    Liu, Yujing
    Hu, Qiaolin
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 153 - 172
  • [7] Cloud-based Biometrics Processing for Privacy-Preserving Identification
    Hahn, Changhee
    Shin, Hyungjune
    Hur, Junbeom
    [J]. 2017 NINTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2017), 2017, : 595 - 600
  • [8] An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking
    Becher, Kilian
    Beck, Martin
    Strufe, Thorsten
    [J]. PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON NETWORKED SYSTEMS (NETSYS 2019), 2019, : 117 - 124
  • [9] Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs
    Zhou, Jun
    Dong, Xiaolei
    Cao, Zhenfu
    Vasilakos, Athanasios V.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (06) : 1299 - 1314
  • [10] Cloud-Based Quadratic Optimization With Partially Homomorphic Encryption
    Alexandru, Andreea B.
    Gatsis, Konstantinos
    Shoukry, Yasser
    Seshia, Sanjit A.
    Tabuada, Paulo
    Pappas, George J.
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (05) : 2357 - 2364