Skip to main content
Top

2017 | OriginalPaper | Chapter

A Flexible Privacy-Preserving Framework for Singular Value Decomposition Under Internet of Things Environment

Authors : Shuo Chen, Rongxing Lu, Jie Zhang

Published in: Trust Management XI

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The singular value decomposition (SVD) is a widely used matrix factorization tool which underlies many useful applications, e.g. recommendation system, abnormal detection and data compression. Under the environment of emerging Internet of Things (IoT), there would be an increasing demand for data analysis. Moreover, due to the large scope of IoT, most of the data analysis work should be handled by fog computing. However, the fog computing devices may not be trustable while the data privacy is the significant concern of the users. Thus, the data privacy should be preserved when performing SVD for data analysis. In this paper, we propose a privacy-preserving fog computing framework for SVD computation. The security and performance analysis shows the practicability of the proposed framework. One application of recommendation system is introduced to show the functionality of the proposed framework.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Billsus, D., Pazzani, M.J.: Learning collaborative information filters. In: ICML 1998, pp. 46–54 (1998) Billsus, D., Pazzani, M.J.: Learning collaborative information filters. In: ICML 1998, pp. 46–54 (1998)
4.
go back to reference Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the MCC Workshop on Mobile Cloud Computing, 1st edn., pp. 13–16. ACM (2012) Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the MCC Workshop on Mobile Cloud Computing, 1st edn., pp. 13–16. ACM (2012)
5.
go back to reference Canny, J.: Collaborative filtering with privacy. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 45–57. IEEE (2002) Canny, J.: Collaborative filtering with privacy. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 45–57. IEEE (2002)
6.
go back to reference Chen, S., Lu, R., Zhang, J.: A flexible privacy-preserving framework for singular value decomposition under internet of things environment. arXiv preprint arXiv:1703.06659 (2017) Chen, S., Lu, R., Zhang, J.: A flexible privacy-preserving framework for singular value decomposition under internet of things environment. arXiv preprint arXiv:​1703.​06659 (2017)
7.
go back to reference Duan, Y., Canny, J., Zhan, J.: P4P: practical large-scale privacy-preserving distributed computation robust against malicious users. In: Proceedings of the 19th USENIX Conference on Security, USENIX Security 2010, p. 14. USENIX Association, Berkeley (2010) Duan, Y., Canny, J., Zhan, J.: P4P: practical large-scale privacy-preserving distributed computation robust against malicious users. In: Proceedings of the 19th USENIX Conference on Security, USENIX Security 2010, p. 14. USENIX Association, Berkeley (2010)
8.
go back to reference Goethals, B., Laur, S., Lipmaa, H., Mielikäinen, T.: On private scalar product computation for privacy-preserving data mining. In: Park, C., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 104–120. Springer, Heidelberg (2005). doi:10.1007/11496618_9 CrossRef Goethals, B., Laur, S., Lipmaa, H., Mielikäinen, T.: On private scalar product computation for privacy-preserving data mining. In: Park, C., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 104–120. Springer, Heidelberg (2005). doi:10.​1007/​11496618_​9 CrossRef
9.
go back to reference Golub, G.H., Van Loan, C.F.: Matrix Computations, vol. 3. JHU Press (2012) Golub, G.H., Van Loan, C.F.: Matrix Computations, vol. 3. JHU Press (2012)
10.
go back to reference Han, S., Ng, W.K., Philip, S.Y.: Privacy-preserving singular value decomposition. In: 2009 IEEE 25th International Conference on Data Engineering, pp. 1267–1270. IEEE (2009) Han, S., Ng, W.K., Philip, S.Y.: Privacy-preserving singular value decomposition. In: 2009 IEEE 25th International Conference on Data Engineering, pp. 1267–1270. IEEE (2009)
11.
go back to reference Hegedűs, I., Jelasity, M., Kocsis, L., Benczúr, A.A.: Fully distributed robust singular value decomposition. In: 14th IEEE International Conference on Peer-to-Peer Computing (P2P), pp. 1–9. IEEE (2014) Hegedűs, I., Jelasity, M., Kocsis, L., Benczúr, A.A.: Fully distributed robust singular value decomposition. In: 14th IEEE International Conference on Peer-to-Peer Computing (P2P), pp. 1–9. IEEE (2014)
12.
go back to reference Idé, T., Kashima, H.: Eigenspace-based anomaly detection in computer systems. In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 440–449. ACM (2004) Idé, T., Kashima, H.: Eigenspace-based anomaly detection in computer systems. In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 440–449. ACM (2004)
13.
14.
go back to reference Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International Conference on World Wide Web, pp. 640–651. ACM (2003) Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International Conference on World Wide Web, pp. 640–651. ACM (2003)
15.
go back to reference Lee, Y.J., Yeh, Y.R., Wang, Y.C.F.: Anomaly detection via online oversampling principal component analysis. IEEE Trans. Knowl. Data Eng. 25(7), 1460–1470 (2013)CrossRef Lee, Y.J., Yeh, Y.R., Wang, Y.C.F.: Anomaly detection via online oversampling principal component analysis. IEEE Trans. Knowl. Data Eng. 25(7), 1460–1470 (2013)CrossRef
16.
go back to reference Lu, R., Liang, X., Li, X., Lin, X., Shen, X.S.: Eppa: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel and Distrib. Syst. 23(9), 1621–1631 (2012)CrossRef Lu, R., Liang, X., Li, X., Lin, X., Shen, X.S.: Eppa: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel and Distrib. Syst. 23(9), 1621–1631 (2012)CrossRef
18.
19.
go back to reference Polat, H., Du, W.: SVD-based collaborative filtering with privacy. In: Proceedings of the 2005 ACM Symposium on Applied Computing, pp. 791–795. ACM (2005) Polat, H., Du, W.: SVD-based collaborative filtering with privacy. In: Proceedings of the 2005 ACM Symposium on Applied Computing, pp. 791–795. ACM (2005)
20.
go back to reference Sang, Y., Shen, H., Tian, H.: Privacy-preserving tuple matching in distributed databases. IEEE Trans. Knowl. Data Eng. 21(12), 1767–1782 (2009)CrossRef Sang, Y., Shen, H., Tian, H.: Privacy-preserving tuple matching in distributed databases. IEEE Trans. Knowl. Data Eng. 21(12), 1767–1782 (2009)CrossRef
21.
go back to reference Sarwar, B., Karypis, G., Konstan, J., Riedl, J.: Application of dimensionality reduction in recommender system-a case study. Technical report, DTIC Document (2000) Sarwar, B., Karypis, G., Konstan, J., Riedl, J.: Application of dimensionality reduction in recommender system-a case study. Technical report, DTIC Document (2000)
24.
go back to reference Zhang, S., Ford, J., Makedon, F.: Deriving private information from randomly perturbed ratings. In: Proceedings of the 2006 SIAM International Conference on Data Mining, pp. 59–69. SIAM (2006) Zhang, S., Ford, J., Makedon, F.: Deriving private information from randomly perturbed ratings. In: Proceedings of the 2006 SIAM International Conference on Data Mining, pp. 59–69. SIAM (2006)
25.
go back to reference Zhong, S.: Privacy-preserving algorithms for distributed mining of frequent itemsets. Inf. Sci. 177(2), 490–503 (2007)CrossRefMATH Zhong, S.: Privacy-preserving algorithms for distributed mining of frequent itemsets. Inf. Sci. 177(2), 490–503 (2007)CrossRefMATH
Metadata
Title
A Flexible Privacy-Preserving Framework for Singular Value Decomposition Under Internet of Things Environment
Authors
Shuo Chen
Rongxing Lu
Jie Zhang
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-59171-1_3

Premium Partner