Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme
TLDR
Experimental results reveals that this approach can securely decompose tensor models, the mathematical model widely used in data-intensive applications, to a core tensor and some truncated orthogonal bases.Abstract:
As the rapidly growing volume of data are beyond the capabilities of many computing infrastructures, to securely process them on cloud has become a preferred solution which can both utilize the powerful capabilities provided by cloud and protect data privacy. This paper puts forward a new approach to securely decompose tensor, the mathematical model widely used in data-intensive applications, to a core tensor and some truncated orthogonal bases. The structured, semi-structured as well as unstructured data are all transformed to low-order sub-tensors which are then encrypted using the fully homomorphic encryption scheme. A unified high-order cipher tensor model is constructed by collecting all the cipher sub-tensors and embedding them to a base tensor space. The cipher tensor is decomposed through a proposed secure algorithm, in which the square root operations are eliminated during the Lanczos procedure. The paper makes an analysis of the secure algorithm in terms of time consumption, memory usage and decomposition accuracy. Experimental results reveals that this approach can securely decompose tensor models. With the advancement of fully homomorphic encryption scheme, the proposed secure tensor decomposition method is expected to be widely applied on cloud for privacy-preserving data processing.read more
Citations
More filters
Journal ArticleDOI
Block-DEF: A secure digital evidence framework using blockchain
TL;DR: This work proposes a secure digital evidence framework using blockchain (Block-DEF) with a loose coupling structure in which the evidence and the evidence information are maintained separately and the multi-signature technique is adopted for evidence submission and retrieval.
Journal ArticleDOI
Selective encryption on ECG data in body sensor network based on supervised machine learning
TL;DR: This paper re-define the SE schemes in a practical scenario of securely outsourcing the electrocardiogram (ECG) data in the untrusted BSN environment and gives the SE design based on this classification use case to protect the ECG data against illegal classification at the attacker sides which protects the patients’ data privacy.
Journal ArticleDOI
File-Centric Multi-Key Aggregate Keyword Searchable Encryption for Industrial Internet of Things
TL;DR: A new insider attack to the Cui's multi-key aggregate searchable encryption scheme, where the unauthorized inside users can guess the other users private keys, is discussed and a novel file-centric multi- key aggregate keyword searchableryption (Fc-MKA-KSE) system is proposed.
Journal ArticleDOI
Federated Tensor Mining for Secure Industrial Internet of Things
TL;DR: The novel federated tensor mining (FTM) framework is proposed to federate multisource data together for tensor-based mining while guaranteeing the security, and real-data-driven simulations demonstrate that FTM not only mines the same knowledge compared with the plaintext mining, but also is enabled to defend the attacks from distributed eavesdroppers and centralized hackers.
Journal ArticleDOI
Secure Data Deduplication With Reliable Key Management for Dynamic Updates in CPSS
TL;DR: This paper proposes a session-key-based convergent key management scheme, named SKC, to secure the dynamic update in the data deduplication and shows that both SKC and CKS can protect the confidentiality of the data and the convergentKey in the case of dynamic updates.
References
More filters
Journal ArticleDOI
A method for obtaining digital signatures and public-key cryptosystems
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Book
Data Mining
TL;DR: In this paper, generalized estimating equations (GEE) with computing using PROC GENMOD in SAS and multilevel analysis of clustered binary data using generalized linear mixed-effects models with PROC LOGISTIC are discussed.
Journal ArticleDOI
A view of cloud computing
Michael Armbrust,Armando Fox,Rean Griffith,Anthony D. Joseph,Randy H. Katz,Andy Konwinski,Gunho Lee,David A. Patterson,Ariel Rabkin,Ion Stoica,Matei Zaharia +10 more
TL;DR: The clouds are clearing the clouds away from the true potential and obstacles posed by this computing capability.
Journal ArticleDOI
Tensor Decompositions and Applications
Tamara G. Kolda,Brett W. Bader +1 more
TL;DR: This survey provides an overview of higher-order tensor decompositions, their applications, and available software.
Related Papers (5)
Optimizations of Brakerski's fully homomorphic encryption scheme
Ting Wu,Hui Wang,You-Ping Liu +2 more