浏览全部资源
扫码关注微信
1. 南开大学网络空间安全学院,天津 300350
2. 天津市网络与数据安全技术重点实验室,天津 300350
[ "贾春福(1967- ),男,河北文安人,博士,南开大学教授、博士生导师,主要研究方向为网络与系统安全、可信计算、恶意代码分析、密码技术应用等。" ]
[ "李瑞琪(1993- ),男,黑龙江尚志人,南开大学博士生,主要研究方向为同态加密、格密码学等。" ]
[ "王雅飞(1995- ),女,天津人,南开大学硕士生,主要研究方向为同态加密应用、隐私保护等。" ]
网络出版日期:2021-02,
纸质出版日期:2021-02-25
移动端阅览
贾春福, 李瑞琪, 王雅飞. 基于同态加密的DBSCAN聚类隐私保护方案[J]. 通信学报, 2021,42(2):1-11.
Chunfu JIA, Ruiqi LI, Yafei WANG. Privacy protection scheme of DBSCAN clustering based on homomorphic encryption[J]. Journal on communications, 2021, 42(2): 1-11.
贾春福, 李瑞琪, 王雅飞. 基于同态加密的DBSCAN聚类隐私保护方案[J]. 通信学报, 2021,42(2):1-11. DOI: 10.11959/j.issn.1000-436x.2021026.
Chunfu JIA, Ruiqi LI, Yafei WANG. Privacy protection scheme of DBSCAN clustering based on homomorphic encryption[J]. Journal on communications, 2021, 42(2): 1-11. DOI: 10.11959/j.issn.1000-436x.2021026.
为了降低数据外包聚类运算过程中存在的隐私泄露风险,提出了一个基于同态加密的 DBSCAN 聚类隐私保护方案。为了加密实际场景中的浮点型数据,给出了针对不同数据精度的3种数据预处理方式,并提出了一种基于数据特点且综合考虑数据精度和计算开销等方面的数据预处理方式的选择策略。由于同态加密不支持密文比较运算,设计了一个用户端与云服务器之间的协议实现密文比较功能。理论分析和实验结果表明,所提方案能够保证数据隐私安全,并且具有较高的聚类准确率和较低的时间开销。
In order to reduce the risk of data privacy leakage in the process of outsourced clustering
a privacy protection scheme of DBSCAN clustering based on homomorphic encryption was proposed.In order to encrypt the float data in the actual scene
three data preprocessing methods for different data accuracy were given
and a policy for choosing a proper data preprocessing method based on data characteristics
accuracy and computational cost was also proposed.For the ciphertext comparison operation that was not supported by homomorphic encryption
a protocol between the client and the cloud server was designed to realize the function of ciphertext comparison.Theoretical analysis and experimental results show that the proposed scheme can ensure the security of data privacy
and has a higher clustering accuracy rate and lower time overhead.
ACAR A , AKSU H , ULUAGAC S , et al . A survey on homomorphic encryption schemes:theory and implementation [J ] . arXiv Preprint,arXiv:1704.03578 , 2017 .
BRAKERSKI Z , GENTRY C , VAIKUNTANATHAN V . (Leveled) fully homomorphic encryption without bootstrapping [C ] // Innovations in Theoretical Computer Science . New York:ACM Press , 2012 : 309 - 325 .
BRAKERSKI Z , VAIKUNTANATHAN V . Fully homomorphic encryption from ring-LWE and security for key dependent messages [C ] // Proceedings of the 31st Annual Conference on Advances in Cryptology . Berlin:Springer , 2011 : 505 - 524 .
KIM J , KIM S , SEO J H . A new scale-invariant homomorphic encryption scheme [J ] . Information Sciences , 2018 , 422 : 177 - 187 .
蒋林智 , 许春香 , 王晓芳 , 等 . 同态加密在基于密文计算模型中的应用 [J ] . 密码学报 , 2017 , 4 ( 6 ): 596 - 610 .
JIANG L Z , XU C X , WANG X F , et al . Application of homomorphic encryption for encrypted computing models [J ] . Journal of Cryptologic Research , 2017 , 4 ( 6 ): 596 - 610 .
YANG H M , HE W C , LI J , et al . Efficient and secure kNN classification over encrypted data using vector homomorphic encryption [C ] // IEEE International Conference on Communications . Piscataway:IEEE Press , 2018 : 1 - 7 .
CHEON J H , JEONG J , KI D , et al . Privacy protection K-means clustering with multiple data owners [J ] . IACR Cryptology ePrint Archive , 2019 ( 2019 ): 466 .
ANGELA J , ARMKNECHT F . Unsupervised machine learning on encrypted data [C ] // International Conference on Selected Areas in Cryptography . Berlin:Springer , 2018 : 453 - 478 .
HU S S , WANG Q , WANG J J , et al . Securing SIFT:privacy protection outsourcing computation of feature extractions over encrypted image data [J ] . IEEE Transactions on Image Processing , 2016 , 25 ( 7 ): 3411 - 3425 .
CHEN G M , CHEN Q , ZHU X Y , et al . Encrypted image feature extraction by privacy protection MFS [C ] // 2018 International Conference on Digital Home . Piscataway:IEEE Press , 2018 : 42 - 45 .
JIANG L Z , XU C X , WANG X F , et al . Secure outsourcing SIFT:efficient and privacy protection image feature extraction in the encrypted domain [J ] . IEEE Transactions on Dependable and Secure Computing , 2017 , PP ( 99 ): 1 .
JIANG L Z , XU C X , WANG X F , et al . Statistical learning based fully homomorphic encryption on encrypted data [J ] . Soft Computing , 2017 , 21 ( 24 ): 7473 - 7483 .
BACON D F , BENT G A , BERGAMASCHI F A , et al . Performing efficient comparison operations on encrypted data:14952210 [P ] .(2015-11-25)[2020-09-28 ] .
JIANG L Q , CAO Y , YUAN C S , et al . An effective comparison protocol over encrypted data in cloud computing [J ] . Journal of Information Security and Applications , 2019 , 48 : 102367 .
贾春福 , 王雅飞 , 陈阳 , 等 . 机器学习算法在同态加密数据集上的应用 [J ] . 清华大学学报(自然科学版) , 2020 , 60 ( 6 ): 456 - 463 .
JIA C F , WANG Y F , CHEN Y , et al . Machine learning algorithms on homomorphic encrypted data set [J ] . Journal of Tsinghua University (Science and Technology) , 2020 , 60 ( 6 ): 456 - 463 .
HALEVI S , SHOUP V . Bootstrapping for HElib [C ] // Annual International Conference on the Theory and Applications of Cryptographic Techniques . Berlin:Springer , 2015 : 641 - 670 .
KRYSZKIEWICZ M , SKONIECZNY L . Faster clustering with DBSCAN [C ] // 2005 Intelligent Information Processing and Web Mining .[S.n.:s.l. ] , 2005 : 605 - 614 .
CHEN Y W , TANG S Y , BOUGUILA N , et al . A fast clustering algorithm based on pruning unnecessary distance computations in DBSCAN for high-dimensional data [C ] // Pattern Recognition .[S.n.:s.l. ] , 2018 : 375 - 387 .
CHEON J H , KIM D , KIM D , et al . Numerical method for comparison on homomorphically encrypted numbers [C ] // 25th International Conference on the Theory and Application of Cryptology and Information Security .[S.n.:s.l. ] , 2019 : 415 - 445 .
谭作文 , 张连福 . 机器学习隐私保护研究综述 [J ] . 软件学报 , 2020 , 31 ( 7 ): 2127 - 2156 .
TAN Z W , ZHANG L F . Survey on privacy preserving techniques for machine learning [J ] . Journal of Software , 2020 , 31 ( 7 ): 2127 - 2156 .
0
浏览量
893
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构