scispace - formally typeset
Open AccessJournal ArticleDOI

Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme

TLDR
Experimental results reveals that this approach can securely decompose tensor models, the mathematical model widely used in data-intensive applications, to a core tensor and some truncated orthogonal bases.
Abstract
As the rapidly growing volume of data are beyond the capabilities of many computing infrastructures, to securely process them on cloud has become a preferred solution which can both utilize the powerful capabilities provided by cloud and protect data privacy. This paper puts forward a new approach to securely decompose tensor, the mathematical model widely used in data-intensive applications, to a core tensor and some truncated orthogonal bases. The structured, semi-structured as well as unstructured data are all transformed to low-order sub-tensors which are then encrypted using the fully homomorphic encryption scheme. A unified high-order cipher tensor model is constructed by collecting all the cipher sub-tensors and embedding them to a base tensor space. The cipher tensor is decomposed through a proposed secure algorithm, in which the square root operations are eliminated during the Lanczos procedure. The paper makes an analysis of the secure algorithm in terms of time consumption, memory usage and decomposition accuracy. Experimental results reveals that this approach can securely decompose tensor models. With the advancement of fully homomorphic encryption scheme, the proposed secure tensor decomposition method is expected to be widely applied on cloud for privacy-preserving data processing.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Block-DEF: A secure digital evidence framework using blockchain

TL;DR: This work proposes a secure digital evidence framework using blockchain (Block-DEF) with a loose coupling structure in which the evidence and the evidence information are maintained separately and the multi-signature technique is adopted for evidence submission and retrieval.
Journal ArticleDOI

Selective encryption on ECG data in body sensor network based on supervised machine learning

TL;DR: This paper re-define the SE schemes in a practical scenario of securely outsourcing the electrocardiogram (ECG) data in the untrusted BSN environment and gives the SE design based on this classification use case to protect the ECG data against illegal classification at the attacker sides which protects the patients’ data privacy.
Journal ArticleDOI

File-Centric Multi-Key Aggregate Keyword Searchable Encryption for Industrial Internet of Things

TL;DR: A new insider attack to the Cui's multi-key aggregate searchable encryption scheme, where the unauthorized inside users can guess the other users private keys, is discussed and a novel file-centric multi- key aggregate keyword searchableryption (Fc-MKA-KSE) system is proposed.
Journal ArticleDOI

Federated Tensor Mining for Secure Industrial Internet of Things

TL;DR: The novel federated tensor mining (FTM) framework is proposed to federate multisource data together for tensor-based mining while guaranteeing the security, and real-data-driven simulations demonstrate that FTM not only mines the same knowledge compared with the plaintext mining, but also is enabled to defend the attacks from distributed eavesdroppers and centralized hackers.
Journal ArticleDOI

Secure Data Deduplication With Reliable Key Management for Dynamic Updates in CPSS

TL;DR: This paper proposes a session-key-based convergent key management scheme, named SKC, to secure the dynamic update in the data deduplication and shows that both SKC and CKS can protect the confidentiality of the data and the convergentKey in the case of dynamic updates.
References
More filters
Book

Matrix computations

Gene H. Golub
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Book

Data Mining

Ian Witten
TL;DR: In this paper, generalized estimating equations (GEE) with computing using PROC GENMOD in SAS and multilevel analysis of clustered binary data using generalized linear mixed-effects models with PROC LOGISTIC are discussed.
Journal ArticleDOI

A view of cloud computing

TL;DR: The clouds are clearing the clouds away from the true potential and obstacles posed by this computing capability.
Journal ArticleDOI

Tensor Decompositions and Applications

TL;DR: This survey provides an overview of higher-order tensor decompositions, their applications, and available software.
Related Papers (5)