Secure Tensor Decomposition for Heterogeneous Multimedia Data in Cloud Computing

With the rapid development and proliferation of multimedia systems and applications, there is a growing need to handle multimedia heterogeneous data safely and efficiently on the cloud. Tensor models are effective in representing multimedia multidimensional data, and the tensor decomposition is one of the basic building blocks of data analysis and learning models. In this article, we propose a secure tensor singular value decomposition (<inline-formula> <tex-math notation="LaTeX">${S}$ </tex-math></inline-formula>-tSVD), in which the time-domain operation is converted into a scheme featuring frequency-domain multilinear circular unfolding–folding. First, we represent various multimedia data as cipher subtensors, using fully homomorphic encryption. We then take the fast Fourier transform (FFT) approach to launch a new multiplication operation along the tubal fibers of a unified high-order tensor. Second, relying on the homomorphism of addition and multiplication theory, we prove the fully homomorphic consistency of the proposed <inline-formula> <tex-math notation="LaTeX">${S}$ </tex-math></inline-formula>-tSVD algorithm. Third, we provide an elegant solution to tackle the typical dimensionality inconsistency problem while working with multiple subtensors. Finally, we carry out theoretical analyses with respect to dimensionality reduction, reconstruction error of <inline-formula> <tex-math notation="LaTeX">${S}$ </tex-math></inline-formula>-tSVD, running time, and data security. We use real unstructured video data and semistructured XML documents, integrating them within a unified tensor model for decomposition. We demonstrate that the error ratio of the <inline-formula> <tex-math notation="LaTeX">${S}$ </tex-math></inline-formula>-tSVD is lower than the same compression ratio compared to the SVD decomposition and tSVD-slice approaches. Moreover, the specific <inline-formula> <tex-math notation="LaTeX">${S}$ </tex-math></inline-formula>-tSVD decomposition not only enables effective data mining and dimensionality reduction but also ensures the accuracy of the decomposition result and data privacy protection.

[1]  Meiko Jensen Challenges of Privacy Protection in Big Data Analytics , 2013, 2013 IEEE International Congress on Big Data.

[2]  Xiaodong Wang,et al.  Fourth-order Tensors with Multidimensional Discrete Transforms , 2017, ArXiv.

[3]  L. Latha,et al.  An enhancement to SePeCloud with improved security and efficient data management , 2018, Cluster Computing.

[4]  Heng Tao Shen,et al.  Principal Component Analysis , 2009, Encyclopedia of Biometrics.

[5]  Xiaoshan Li,et al.  Tucker Tensor Regression and Neuroimaging Analysis , 2018, Statistics in Biosciences.

[6]  Zhenggang Huo,et al.  Personal Privacy Security Management in the Era of Big Data , 2015 .

[7]  Laurence T. Yang,et al.  A Tensor-Based Approach for Big Data Representation and Dimensionality Reduction , 2014, IEEE Transactions on Emerging Topics in Computing.

[8]  Xiaodong Wang,et al.  Low-Tubal-Rank Tensor Completion Using Alternating Minimization , 2016, IEEE Transactions on Information Theory.

[9]  Misha Elena Kilmer,et al.  Third-Order Tensors as Operators on Matrices: A Theoretical and Computational Framework with Applications in Imaging , 2013, SIAM J. Matrix Anal. Appl..

[10]  Nathan Halko,et al.  Finding Structure with Randomness: Probabilistic Algorithms for Constructing Approximate Matrix Decompositions , 2009, SIAM Rev..

[11]  Misha Elena Kilmer,et al.  Novel Methods for Multilinear Data Completion and De-noising Based on Tensor-SVD , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[12]  Xin Yi Generalized trace of matrix , 2007 .

[13]  T. Kolda Multilinear operators for higher-order decompositions , 2006 .

[14]  Ngai Wong,et al.  Computing low-rank approximations of large-scale matrices with the Tensor Network randomized SVD , 2018, SIAM J. Matrix Anal. Appl..

[15]  Laurence T. Yang,et al.  Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme , 2018, IEEE Transactions on Cloud Computing.

[16]  Tamara G. Kolda,et al.  MATLAB tensor classes for fast algorithm prototyping. , 2004 .

[17]  Ce Zhu,et al.  Tensor rank learning in CP decomposition via convolutional neural network , 2019, Signal Process. Image Commun..

[18]  Peng Li,et al.  An Adaptive Dropout Deep Computation Model for Industrial IoT Big Data Learning With Crowdsourcing to Cloud Computing , 2019, IEEE Transactions on Industrial Informatics.

[19]  Keke Gai,et al.  Advanced Fully Homomorphic Encryption Scheme Over Real Numbers , 2017, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).

[20]  Nadia Kreimer,et al.  A Tensor Higher-order Singular Value Decomposition (HOSVD) For Pre-stack Simultaneous Noise-reduction And Interpolation , 2011 .

[21]  Misha Elena Kilmer,et al.  Novel Factorization Strategies for Higher Order Tensors: Implications for Compression and Recovery of Multi-linear Data , 2013, ArXiv.

[22]  M. Kilmer,et al.  Factorization strategies for third-order tensors , 2011 .

[23]  Ahmed El-Yahyaoui,et al.  A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security , 2018, ArXiv.

[24]  Craig Gentry,et al.  Ring Switching in BGV-Style Homomorphic Encryption , 2012, SCN.

[25]  Tamara G. Kolda,et al.  Tensor Decompositions and Applications , 2009, SIAM Rev..