• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Hu, Chenfei (Hu, Chenfei.) [1] | Zhang, Chuan (Zhang, Chuan.) [2] | Lei, Dian (Lei, Dian.) [3] | Wu, Tong (Wu, Tong.) [4] | Liu, Ximeng (Liu, Ximeng.) [5] | Zhu, Liehuang (Zhu, Liehuang.) [6]

Indexed by:

EI

Abstract:

With the proliferation of machine learning, the cloud server has been employed to collect massive data and train machine learning models. Several privacy-preserving machine learning schemes have been suggested recently to guarantee data and model privacy in the cloud. However, these schemes either mandate the involvement of the data owner in model training or utilize high-cost cryptographic techniques, resulting in excessive computational and communication overheads. Furthermore, none of the existing work considers the malicious behavior of the cloud server during model training. In this paper, we propose the first privacy-preserving and verifiable support vector machine training scheme by employing a two-cloud platform. Specifically, based on the homomorphic verification tag, we design a verification mechanism to enable verifiable machine learning training. Meanwhile, to improve the efficiency of model training, we combine homomorphic encryption and data perturbation to design an efficient multiplication operation for the encryption domain. A rigorous theoretical analysis demonstrates the security and reliability of our scheme. The experimental results indicate that our scheme can reduce computational and communication overheads by at least 43.94% and 99.58%, respectively, compared to state-of-the-art SVM training methods. © 2005-2012 IEEE.

Keyword:

Cloud computing Privacy-preserving techniques Reliability analysis Support vector machines Vectors

Community:

  • [ 1 ] [Hu, Chenfei]Beijing Institute of Technology, School of Computer Science and Technology, Beijing; 100081, China
  • [ 2 ] [Zhang, Chuan]Beijing Institute of Technology, School of Cyberspace Science and Technology, Beijing; 100081, China
  • [ 3 ] [Zhang, Chuan]Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies, Shenzhen; 518055, China
  • [ 4 ] [Lei, Dian]Lanzhou University, School of Information Science and Engineering, Lanzhou; 730000, China
  • [ 5 ] [Wu, Tong]Beijing Institute of Technology, School of Cyberspace Science and Technology, Beijing; 100081, China
  • [ 6 ] [Liu, Ximeng]Fuzhou University, College of Computer and Data Science, Fuzhou; 350025, China
  • [ 7 ] [Liu, Ximeng]Fujian Provincial Key Laboratory of Information Security of Network Systems, Fuzhou; 350025, China
  • [ 8 ] [Zhu, Liehuang]Beijing Institute of Technology, School of Cyberspace Science and Technology, Beijing; 100081, China

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Information Forensics and Security

ISSN: 1556-6013

Year: 2023

Volume: 18

Page: 3476-3491

6 . 3

JCR@2023

6 . 3 0 0

JCR@2023

ESI HC Threshold:32

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 43

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Affiliated Colleges:

Online/Total:136/10115030
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1