Skip to main content
Top

2018 | OriginalPaper | Chapter

Outsourced Privacy Preserving SVM with Multiple Keys

Authors : Wenli Sun, Zoe L. Jiang, Jun Zhang, S. M. Yiu, Yulin Wu, Hainan Zhao, Xuan Wang, Peng Zhang

Published in: Algorithms and Architectures for Parallel Processing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the development of cloud computing, more and more people choose to upload their own data to cloud for storage outsourcing and computing outsourcing. Because cloud is not completely trusted, the uploading data is encrypted by user’s own public key. However, many of the current secure computing methods only apply to single-key encrypted data. Therefore, it is a challenge to efficiently handle multiple key-encrypted data on cloud. On the other hand, the Demand for data classification is also growing. In particular, using support vector machine (SVM) algorithm to classify data. But currently there is no good way to utilize SVM for ciphertext especially the ciphertext is encrypted by multiple key. Therefore, it is also a challenge to efficiently classify data encrypted by multiple keys using SVM. In order to solve the above challenges, in this paper we propose a scheme that allows the SVM algorithm to perform classification processing on the outsourced data encrypted by multi-key without jeopardizing the privacy of the user’s original data, intermediate calculation results and final classification result. In addition, we also verified the safety and correctness of our designed protocol.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Yu, H., Jiang, X., Vaidya, J.: Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data. In: Proceedings of the 2006 ACM Symposium on Applied Computing, pp. 603–610. ACM (2006) Yu, H., Jiang, X., Vaidya, J.: Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data. In: Proceedings of the 2006 ACM Symposium on Applied Computing, pp. 603–610. ACM (2006)
3.
go back to reference Vaidya, J., Yu, H., Jiang, X.: Privacy-preserving SVM classification. Knowl. Inf. Syst. 14(2), 161–178 (2008)CrossRef Vaidya, J., Yu, H., Jiang, X.: Privacy-preserving SVM classification. Knowl. Inf. Syst. 14(2), 161–178 (2008)CrossRef
4.
go back to reference Hu, Y., He, G., Fang, L., et al.: Privacy-preserving SVM classification on arbitrarily partitioned data. In: IEEE International Conference on Progress in Informatics and Computing, pp. 543–546 (2010) Hu, Y., He, G., Fang, L., et al.: Privacy-preserving SVM classification on arbitrarily partitioned data. In: IEEE International Conference on Progress in Informatics and Computing, pp. 543–546 (2010)
5.
go back to reference Liu, X., Jiang, Z.L., Yiu, S.M., et al.: Outsourcing two-party privacy preserving k-means clustering protocol in wireless sensor networks. In: 2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN), pp. 124–133. IEEE (2015) Liu, X., Jiang, Z.L., Yiu, S.M., et al.: Outsourcing two-party privacy preserving k-means clustering protocol in wireless sensor networks. In: 2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN), pp. 124–133. IEEE (2015)
6.
go back to reference Zhang, Q., Yang, L.T., Chen, Z.: Privacy preserving deep computation model on cloud for big data feature learning. IEEE Trans. Comput. 65(5), 1351–1362 (2016)MathSciNetCrossRef Zhang, Q., Yang, L.T., Chen, Z.: Privacy preserving deep computation model on cloud for big data feature learning. IEEE Trans. Comput. 65(5), 1351–1362 (2016)MathSciNetCrossRef
7.
go back to reference Peter, A., Tews, E., Katzenbeisser, S.: Efficiently outsourcing multiparty computation under multiple keys. IEEE Trans. Inf. Forensics Secur. 8(12), 2046–2058 (2013)CrossRef Peter, A., Tews, E., Katzenbeisser, S.: Efficiently outsourcing multiparty computation under multiple keys. IEEE Trans. Inf. Forensics Secur. 8(12), 2046–2058 (2013)CrossRef
8.
go back to reference Liu, F., Ng, W.K., Zhang, W.: Encrypted SVM for outsourced data mining. In: 2015 IEEE 8th International Conference on Cloud Computing (CLOUD), pp. 1085–1092. IEEE (2015) Liu, F., Ng, W.K., Zhang, W.: Encrypted SVM for outsourced data mining. In: 2015 IEEE 8th International Conference on Cloud Computing (CLOUD), pp. 1085–1092. IEEE (2015)
9.
go back to reference Zhang, J., Wang, X., Yiu, S.M., et al.: Secure dot product of outsourced encrypted vectors and its application to SVM. In: Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, pp. 75–82. ACM (2017) Zhang, J., Wang, X., Yiu, S.M., et al.: Secure dot product of outsourced encrypted vectors and its application to SVM. In: Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, pp. 75–82. ACM (2017)
12.
go back to reference Liu, X., Deng, R.H., Choo, K.K.R., et al.: An efficient privacy-preserving outsourced calculation toolkit with multiple keys. IEEE Trans. Inf. Forensics Secur. 11(11), 2401–2414 (2016)CrossRef Liu, X., Deng, R.H., Choo, K.K.R., et al.: An efficient privacy-preserving outsourced calculation toolkit with multiple keys. IEEE Trans. Inf. Forensics Secur. 11(11), 2401–2414 (2016)CrossRef
14.
go back to reference Li, C., Ma, W.: Comments on “an efficient privacy-preserving outsourced calculation toolkit with multiple keys”. IEEE Trans. Inf. Forensics Secur. 13(10), 2668–2669 (2018)CrossRef Li, C., Ma, W.: Comments on “an efficient privacy-preserving outsourced calculation toolkit with multiple keys”. IEEE Trans. Inf. Forensics Secur. 13(10), 2668–2669 (2018)CrossRef
15.
go back to reference Knuth, D.E.: The Art of Computer Programming: Seminumerical Algorithms, vol. 2, Addison Wesley, Boston (1981) Knuth, D.E.: The Art of Computer Programming: Seminumerical Algorithms, vol. 2, Addison Wesley, Boston (1981)
16.
go back to reference Li, P., Li, J., Huang, Z., et al.: Multi-key privacy-preserving deep learning in cloud computing. Future Gen. Comput. Syst. 74, 76–85 (2017)CrossRef Li, P., Li, J., Huang, Z., et al.: Multi-key privacy-preserving deep learning in cloud computing. Future Gen. Comput. Syst. 74, 76–85 (2017)CrossRef
17.
go back to reference Li, P., Li, J., Huang, Z., et al.: Privacy-preserving outsourced classification in cloud computing. Cluster Comput. 21, 1–10 (2017)CrossRef Li, P., Li, J., Huang, Z., et al.: Privacy-preserving outsourced classification in cloud computing. Cluster Comput. 21, 1–10 (2017)CrossRef
Metadata
Title
Outsourced Privacy Preserving SVM with Multiple Keys
Authors
Wenli Sun
Zoe L. Jiang
Jun Zhang
S. M. Yiu
Yulin Wu
Hainan Zhao
Xuan Wang
Peng Zhang
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-05063-4_32

Premium Partner