Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment

Tensors are popular and versatile tools which model multidimensional data. Tensor decomposition has emerged as a powerful technique dealing with multidimensional data. With the booming development of cloud computing, a large number of users are inclined to outsource big data storage and computations to the cloud. However, because of the rise of various privacy concerns, sensitive data usually need to be encrypted prior to being outsourced to a cloud. Computations over encrypted data in the cloud without compromising the privacy of data is still a challenge. This paper presents a novel privacy-preserving tensor decomposition approach over semantically secure encrypted big data. The proposed approach leverages properties of homomorphic encryption and employs a federated cloud to securely decompose an encrypted tensor for multiple users, without the clouds learning any knowledge about users’ data. This is, to our knowledge, the first attempt to solve privacy-preserving tensor decomposition without requiring interaction between users and cloud service providers. In addition, in our approach, we present the first secure integer division and integer square root schemes over encrypted data (the dividend, divisor and radicand are in encrypted format). Finally, we prove the security of our approach under semi-trusted model and empirically analyze its effectiveness, which demonstrates the utility of our proposed approach in cloud deployments.

[1]  Rajarshi Shahu,et al.  K-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data , 2016 .

[2]  Laurence T. Yang,et al.  Role-Dependent Privacy Preservation for Secure V2G Networks in the Smart Grid , 2014, IEEE Transactions on Information Forensics and Security.

[3]  Christos Faloutsos,et al.  HaTen2: Billion-scale tensor decompositions , 2015, 2015 IEEE 31st International Conference on Data Engineering.

[4]  Minyi Guo,et al.  High-Performance Computing : Paradigm and Infrastructure , 2005 .

[5]  Marina Blanton Achieving Full Security in Privacy-Preserving Data Mining , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[6]  Shafi Goldwasser,et al.  Machine Learning Classification over Encrypted Data , 2015, NDSS.

[7]  Rafail Ostrovsky,et al.  Secure two-party k-means clustering , 2007, CCS '07.

[8]  Laurence T. Yang,et al.  A Tensor-Train Deep Computation Model for Industry Informatics Big Data Feature Learning , 2018, IEEE Transactions on Industrial Informatics.

[9]  Yiwei Thomas Hou,et al.  Privacy-preserving pattern matching over encrypted genetic data in cloud computing , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[10]  Rakesh Agrawal,et al.  Privacy-preserving data mining , 2000, SIGMOD 2000.

[11]  Victor C. M. Leung,et al.  A Novel Sensory Data Processing Framework to Integrate Sensor Networks With Mobile Cloud , 2016, IEEE Systems Journal.

[12]  Li Wan,et al.  Privacy-Preserving Gradient-Descent Methods , 2010, IEEE Transactions on Knowledge and Data Engineering.

[13]  Taneli Mielikäinen,et al.  Cryptographically private support vector machines , 2006, KDD '06.

[14]  Wei Jiang,et al.  An efficient and probabilistic secure bit-decomposition , 2013, ASIA CCS '13.

[15]  Jian Pei,et al.  Secure Skyline Queries on Cloud Platform , 2017, 2017 IEEE 33rd International Conference on Data Engineering (ICDE).

[16]  Thijs Veugen,et al.  Encrypted integer division and secure comparison , 2014, Int. J. Appl. Cryptogr..

[17]  Laurence T. Yang,et al.  Scheduling in Distributed Computing Systems: Analysis, Design and Models , 2008 .

[18]  Christos Faloutsos,et al.  GigaTensor: scaling tensor analysis up by 100 times - algorithms and discoveries , 2012, KDD.

[19]  Laurence T. Yang,et al.  Aggregated-Proofs Based Privacy-Preserving Authentication for V2G Networks in the Smart Grid , 2012, IEEE Transactions on Smart Grid.

[20]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2002, Journal of Cryptology.

[21]  Muttukrishnan Rajarajan,et al.  Efficient Privacy-Preserving Facial Expression Classification , 2017, IEEE Transactions on Dependable and Secure Computing.

[22]  Laurence T. Yang,et al.  Tensor-based Big Biometric Data Reduction in Cloud , 2018, IEEE Cloud Computing.

[23]  Laurence T. Yang,et al.  An improved parallel block Lanczos algorithm over GF(2) for integer factorization , 2017, Inf. Sci..

[24]  Muttukrishnan Rajarajan,et al.  Privacy-Preserving Clinical Decision Support System Using Gaussian Kernel-Based Classification , 2014, IEEE Journal of Biomedical and Health Informatics.

[25]  Joseph K. Liu,et al.  Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data , 2020, IEEE Transactions on Dependable and Secure Computing.

[26]  Zekeriya Erkin,et al.  Secure Comparison Protocols in the Semi-Honest Model , 2015, IEEE Journal of Selected Topics in Signal Processing.

[27]  Philip S. Yu,et al.  Privacy-Preserving Singular Value Decomposition , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[28]  Octavian Catrina,et al.  Secure Computation with Fixed-Point Numbers , 2010, Financial Cryptography.

[29]  Mikhail J. Atallah,et al.  Private collaborative forecasting and benchmarking , 2004, WPES '04.

[30]  Yousef Saad,et al.  Cucheb: A GPU implementation of the filtered Lanczos procedure , 2017, Comput. Phys. Commun..

[31]  Laurence T. Yang,et al.  Data Exfiltration From Internet of Things Devices: iOS Devices as Case Studies , 2017, IEEE Internet of Things Journal.

[32]  Manuel Liedel Secure Distributed Computation of the Square Root and Applications , 2012, ISPEC.

[33]  Robert H. Deng,et al.  Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud , 2019, IEEE Transactions on Big Data.