期刊
IEEE ACCESS
卷 10, 期 -, 页码 39407-39423出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2022.3166523
关键词
Outsourcing; Task analysis; Protocols; Servers; Privacy; Cloud computing; Clustering algorithms; Privacy-preserving; secure outsourcing computation; K-means; silhouette coefficient
资金
- National Natural Science Foundation of China [62172161, 62132005, 62172162]
- Natural Science Foundation of Shanghai [20ZR1418400]
In this paper, a novel multifunctional and privacy-preserving outsourcing computation toolkit is proposed, which supports complex computing tasks such as machine learning and provides efficient and feasible homomorphic conversion protocols and homomorphic K-means algorithm.
Although tremendous revolution has been made in the emerging cloud computing technologies over digital devices, privacy gradually becomes a big concern in outsourcing computation. Homomorphic encryption has been proposed to facilitate the preservation of data privacy while computational tasks being executed on ciphertext. However, many existing studies only support limited homomorphic calculation functions which barely satisfy complex computing tasks such as machine learning with massive computing resources and rich types of function. To address this problem, a novel multifunctional and privacy-preserving outsourcing computation toolkit is proposed in this paper, which supports several homomorphic computing protocols including division and power on ciphertext of integers and floating point numbers. Specifically, we first implement the homomorphic mutual conversion protocol between integer and floating point ciphertext to balance the efficiency and feasibility, considering the high-precision ciphertext operation on floating point numbers costs 100x computational overhead than that on integers. Second, we implement a homomorphic K-means algorithm based on our proposed toolkit for clustering and design the homomorphic silhouette coefficient as the evaluation index, thereby providing an informative cluster assessment for local users with limited resources. Then, we simulate the protocols of our proposed toolkit to explore the parameter sensitivity in terms of computational efficiency. Last, we report security analysis to prove the security of our toolkit without privacy leakage to unauthorized parties. Comprehensive experiments further demonstrate the efficiency and utility of our toolkit.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据