Outsourced Privacy Preserving SVM with Multiple Keys

With the development of cloud computing, more and more people choose to upload their own data to cloud for storage outsourcing and computing outsourcing. Because cloud is not completely trusted, the uploading data is encrypted by user’s own public key. However, many of the current secure computing methods only apply to single-key encrypted data. Therefore, it is a challenge to efficiently handle multiple key-encrypted data on cloud. On the other hand, the Demand for data classification is also growing. In particular, using support vector machine (SVM) algorithm to classify data. But currently there is no good way to utilize SVM for ciphertext especially the ciphertext is encrypted by multiple key. Therefore, it is also a challenge to efficiently classify data encrypted by multiple keys using SVM. In order to solve the above challenges, in this paper we propose a scheme that allows the SVM algorithm to perform classification processing on the outsourced data encrypted by multi-key without jeopardizing the privacy of the user’s original data, intermediate calculation results and final classification result. In addition, we also verified the safety and correctness of our designed protocol.

[1]  Guoping He,et al.  Privacy-preserving SVM classification on arbitrarily partitioned data , 2010, 2010 IEEE International Conference on Progress in Informatics and Computing.

[2]  Jaideep Vaidya,et al.  Knowledge and Information Systems , 2007 .

[3]  Stefan Katzenbeisser,et al.  Efficiently Outsourcing Multiparty Computation Under Multiple Keys , 2013, IEEE Transactions on Information Forensics and Security.

[4]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[5]  Laurence T. Yang,et al.  Privacy Preserving Deep Computation Model on Cloud for Big Data Feature Learning , 2016, IEEE Transactions on Computers.

[6]  Siu-Ming Yiu,et al.  Multi-key privacy-preserving deep learning in cloud computing , 2017, Future Gener. Comput. Syst..

[7]  Jin Li,et al.  Privacy-preserving outsourced classification in cloud computing , 2017, Cluster Computing.

[8]  Ximeng Liu,et al.  An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys , 2016, IEEE Transactions on Information Forensics and Security.

[9]  Chen Li,et al.  Comments on “An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys” , 2018, IEEE Transactions on Information Forensics and Security.

[10]  Wei Zhang,et al.  Encrypted SVM for Outsourced Data Mining , 2015, 2015 IEEE 8th International Conference on Cloud Computing.

[11]  Zoe L. Jiang,et al.  Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM , 2017, SCC@AsiaCCS.

[12]  Emmanuel Bresson,et al.  A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications , 2003, ASIACRYPT.

[13]  Jaideep Vaidya,et al.  Privacy-Preserving SVM Classification on Vertically Partitioned Data , 2006, PAKDD.

[14]  Jaideep Vaidya,et al.  Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data , 2006, SAC.

[15]  Zoe L. Jiang,et al.  Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks , 2015, 2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN).

[16]  Siu-Ming Yiu,et al.  Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery , 2017, DBSec.

[17]  Donald Ervin Knuth,et al.  The Art of Computer Programming, Volume II: Seminumerical Algorithms , 1970 .