Skip to main content

2017 | OriginalPaper | Buchkapitel

A Flexible Privacy-Preserving Framework for Singular Value Decomposition Under Internet of Things Environment

verfasst von : Shuo Chen, Rongxing Lu, Jie Zhang

Erschienen in: Trust Management XI

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The singular value decomposition (SVD) is a widely used matrix factorization tool which underlies many useful applications, e.g. recommendation system, abnormal detection and data compression. Under the environment of emerging Internet of Things (IoT), there would be an increasing demand for data analysis. Moreover, due to the large scope of IoT, most of the data analysis work should be handled by fog computing. However, the fog computing devices may not be trustable while the data privacy is the significant concern of the users. Thus, the data privacy should be preserved when performing SVD for data analysis. In this paper, we propose a privacy-preserving fog computing framework for SVD computation. The security and performance analysis shows the practicability of the proposed framework. One application of recommendation system is introduced to show the functionality of the proposed framework.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Billsus, D., Pazzani, M.J.: Learning collaborative information filters. In: ICML 1998, pp. 46–54 (1998) Billsus, D., Pazzani, M.J.: Learning collaborative information filters. In: ICML 1998, pp. 46–54 (1998)
4.
Zurück zum Zitat Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the MCC Workshop on Mobile Cloud Computing, 1st edn., pp. 13–16. ACM (2012) Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the MCC Workshop on Mobile Cloud Computing, 1st edn., pp. 13–16. ACM (2012)
5.
Zurück zum Zitat Canny, J.: Collaborative filtering with privacy. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 45–57. IEEE (2002) Canny, J.: Collaborative filtering with privacy. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 45–57. IEEE (2002)
6.
Zurück zum Zitat Chen, S., Lu, R., Zhang, J.: A flexible privacy-preserving framework for singular value decomposition under internet of things environment. arXiv preprint arXiv:1703.06659 (2017) Chen, S., Lu, R., Zhang, J.: A flexible privacy-preserving framework for singular value decomposition under internet of things environment. arXiv preprint arXiv:​1703.​06659 (2017)
7.
Zurück zum Zitat Duan, Y., Canny, J., Zhan, J.: P4P: practical large-scale privacy-preserving distributed computation robust against malicious users. In: Proceedings of the 19th USENIX Conference on Security, USENIX Security 2010, p. 14. USENIX Association, Berkeley (2010) Duan, Y., Canny, J., Zhan, J.: P4P: practical large-scale privacy-preserving distributed computation robust against malicious users. In: Proceedings of the 19th USENIX Conference on Security, USENIX Security 2010, p. 14. USENIX Association, Berkeley (2010)
8.
Zurück zum Zitat Goethals, B., Laur, S., Lipmaa, H., Mielikäinen, T.: On private scalar product computation for privacy-preserving data mining. In: Park, C., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 104–120. Springer, Heidelberg (2005). doi:10.1007/11496618_9 CrossRef Goethals, B., Laur, S., Lipmaa, H., Mielikäinen, T.: On private scalar product computation for privacy-preserving data mining. In: Park, C., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 104–120. Springer, Heidelberg (2005). doi:10.​1007/​11496618_​9 CrossRef
9.
Zurück zum Zitat Golub, G.H., Van Loan, C.F.: Matrix Computations, vol. 3. JHU Press (2012) Golub, G.H., Van Loan, C.F.: Matrix Computations, vol. 3. JHU Press (2012)
10.
Zurück zum Zitat Han, S., Ng, W.K., Philip, S.Y.: Privacy-preserving singular value decomposition. In: 2009 IEEE 25th International Conference on Data Engineering, pp. 1267–1270. IEEE (2009) Han, S., Ng, W.K., Philip, S.Y.: Privacy-preserving singular value decomposition. In: 2009 IEEE 25th International Conference on Data Engineering, pp. 1267–1270. IEEE (2009)
11.
Zurück zum Zitat Hegedűs, I., Jelasity, M., Kocsis, L., Benczúr, A.A.: Fully distributed robust singular value decomposition. In: 14th IEEE International Conference on Peer-to-Peer Computing (P2P), pp. 1–9. IEEE (2014) Hegedűs, I., Jelasity, M., Kocsis, L., Benczúr, A.A.: Fully distributed robust singular value decomposition. In: 14th IEEE International Conference on Peer-to-Peer Computing (P2P), pp. 1–9. IEEE (2014)
12.
Zurück zum Zitat Idé, T., Kashima, H.: Eigenspace-based anomaly detection in computer systems. In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 440–449. ACM (2004) Idé, T., Kashima, H.: Eigenspace-based anomaly detection in computer systems. In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 440–449. ACM (2004)
13.
14.
Zurück zum Zitat Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International Conference on World Wide Web, pp. 640–651. ACM (2003) Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International Conference on World Wide Web, pp. 640–651. ACM (2003)
15.
Zurück zum Zitat Lee, Y.J., Yeh, Y.R., Wang, Y.C.F.: Anomaly detection via online oversampling principal component analysis. IEEE Trans. Knowl. Data Eng. 25(7), 1460–1470 (2013)CrossRef Lee, Y.J., Yeh, Y.R., Wang, Y.C.F.: Anomaly detection via online oversampling principal component analysis. IEEE Trans. Knowl. Data Eng. 25(7), 1460–1470 (2013)CrossRef
16.
Zurück zum Zitat Lu, R., Liang, X., Li, X., Lin, X., Shen, X.S.: Eppa: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel and Distrib. Syst. 23(9), 1621–1631 (2012)CrossRef Lu, R., Liang, X., Li, X., Lin, X., Shen, X.S.: Eppa: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel and Distrib. Syst. 23(9), 1621–1631 (2012)CrossRef
17.
18.
Zurück zum Zitat Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). doi:10.1007/3-540-48910-X_16 CrossRef Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). doi:10.​1007/​3-540-48910-X_​16 CrossRef
19.
Zurück zum Zitat Polat, H., Du, W.: SVD-based collaborative filtering with privacy. In: Proceedings of the 2005 ACM Symposium on Applied Computing, pp. 791–795. ACM (2005) Polat, H., Du, W.: SVD-based collaborative filtering with privacy. In: Proceedings of the 2005 ACM Symposium on Applied Computing, pp. 791–795. ACM (2005)
20.
Zurück zum Zitat Sang, Y., Shen, H., Tian, H.: Privacy-preserving tuple matching in distributed databases. IEEE Trans. Knowl. Data Eng. 21(12), 1767–1782 (2009)CrossRef Sang, Y., Shen, H., Tian, H.: Privacy-preserving tuple matching in distributed databases. IEEE Trans. Knowl. Data Eng. 21(12), 1767–1782 (2009)CrossRef
21.
Zurück zum Zitat Sarwar, B., Karypis, G., Konstan, J., Riedl, J.: Application of dimensionality reduction in recommender system-a case study. Technical report, DTIC Document (2000) Sarwar, B., Karypis, G., Konstan, J., Riedl, J.: Application of dimensionality reduction in recommender system-a case study. Technical report, DTIC Document (2000)
24.
Zurück zum Zitat Zhang, S., Ford, J., Makedon, F.: Deriving private information from randomly perturbed ratings. In: Proceedings of the 2006 SIAM International Conference on Data Mining, pp. 59–69. SIAM (2006) Zhang, S., Ford, J., Makedon, F.: Deriving private information from randomly perturbed ratings. In: Proceedings of the 2006 SIAM International Conference on Data Mining, pp. 59–69. SIAM (2006)
25.
Zurück zum Zitat Zhong, S.: Privacy-preserving algorithms for distributed mining of frequent itemsets. Inf. Sci. 177(2), 490–503 (2007)CrossRefMATH Zhong, S.: Privacy-preserving algorithms for distributed mining of frequent itemsets. Inf. Sci. 177(2), 490–503 (2007)CrossRefMATH
Metadaten
Titel
A Flexible Privacy-Preserving Framework for Singular Value Decomposition Under Internet of Things Environment
verfasst von
Shuo Chen
Rongxing Lu
Jie Zhang
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-59171-1_3