期刊文献+

云计算环境下安全的极限学习机外包机制 被引量:2

Secure outsourcing of extreme learning machine in cloud computing
下载PDF
导出
摘要 应用程序中涉及到的数据日益扩大且结构日益复杂,使得在大规模数据上运行极限学习机ELM成为一个具有挑战性的任务。为了应对这一挑战,提出了一个在云计算环境下安全和实用的ELM外包机制。该机制将ELM显式地分为私有部分和公有部分,可以有效地减少训练时间,并确保算法输入与输出的安全性。私有部分主要负责随机参数的生成和一些简单的矩阵计算;公有部分外包到云计算服务器中,由云计算服务商负责ELM算法中计算量最大的计算Moore-Penrose广义逆的操作。该广义逆也作为证据以验证结果的正确性和可靠性。我们从理论上对该外包机制的安全性进行了分析。在CIFAR-10数据集上的实验结果表明,我们所提出的机制可以有效地减少用户的计算量。 Duo to the enlarging volume and increasingly complex structure of data involved in applications, running the extreme learning machine (ELM) over large-scale data becomes a challenging task. In order to reduce the training time while assuring the confidentiality of ELM's input and output, we present a secure and practical outsourcing mechanism for ELM in cloud computing. In this mechanism, we explicitly divide the ELM into two parts: public part and private part. The latter is executed locally to generate random parameters and do some simple matrix computation while the former part is outsourced by cloud computing that is mainly responsible for calculating the Moore-Penrose generalized inverse, the heaviest computational operation. The inverse also serves as the correctness and soundness proof in result verification. We analyze the confidentiality theoretically and the experimental results demonstrate that the proposed mechanism can effectively release customers from heavy computation.
出处 《计算机工程与科学》 CSCD 北大核心 2015年第10期1806-1810,共5页 Computer Engineering & Science
基金 国家自然科学基金资助项目(61379145 61170287 61232016 61070198 61402508)
关键词 极限学习机 云计算 计算外包 数据安全 隐私保护 结果验证 cloud computing extreme learning machine computing outsourcing data security privacy-preserving result verification
  • 相关文献

参考文献10

  • 1Wang C, Ren K, Wang J. Secure and practical outsourcing of linear programming in cloud computing[C]//Proc of IN FOCOM, 2011 : 820-828.
  • 2Huang G-B,Zhu Q-Y, Slew C-K. Extreme learning machine: A new learning scheme of feedforward neural networks[C]// Proc of International Joint Conference on Neural Networks, 2004:985-990.
  • 3Huang G-B,Zhu Q-Y,Siew C-K. Extreme learning machine: Theory and applications[J]. Neurocomputing, 2006,70 (1- 3) :489-501.
  • 4Huang G B, Zhou H, Ding X, et al. Extreme learning ma- chine for regression and multiclass classification[J]. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cy hernetics,2012,42(2) :513-529.
  • 5He Q, Shang T, Zhuang F,et al. Parallel extreme learning machine for regression based on MapReduce[J]. Neurocom- puting,2012,102(S1 ) :52-58.
  • 6van Heeswijk M, Miche Y,Oja E,et al. GPU-accelerated and parallelized ELM ensembles for large-scale regression[J]. Neurocomputing, 2011,74 (16) : 2430-2437.
  • 7Serre D. Matrices: Theory and applications[M]. New York: Springer, 2010.
  • 8Yong CHENG,Zhi-ying WANG,Jun MA,Jiang-jiang WU,Song-zhu MEI,Jiang-chun REN.Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage[J].Journal of Zhejiang University-Science C(Computers and Electronics),2013,14(2):85-97. 被引量:11
  • 9史佩昌,王怀民,尹浩,丁博,刘雪宁,王淼.云服务传递网络的多业务可信部署方法(英文)[J].China Communications,2011,8(4):65-75. 被引量:1
  • 10Krizhevsky A, Hinton G. Learning multiple layers of fea- tures from tiny images[D]. Toronto: Department of Com- puter Science, University of Toronto, 2009.

二级参考文献59

  • 1Defining"Cloud Services"-An IDC Update. http: / /blogs.idc.com/ie/- p = 422 . 2011
  • 2KIM S,YOON M,SHIN Y.Placement Algorithm of Web Server Replicas. Proceedings of the 2004 In- ternational Conference on Computational Science and Its Applications . 2004
  • 3SU Zhou,KATTO J,YASUDA Y.Replication Algorithms to Retrieve Scalable Streaming Media over Content Delivery Networks. Proceedings of the 5th ACM SIGMM Interna- tional Workshop on Multimedia Information Retrieval . 2003
  • 4CAHILL A,SREENAN C.An Efficient CDN Placement Algorithm for the Delivery of High Quality TV Content. Proceedings of the 12th Annual ACM Internation- al Conference on Multimedia . 2004
  • 5AHUJA S,KRUNZ M.Algorithms for Server Placement in Multiple-description-based Media Streaming. IEEETransactions on Multimedia . 2008
  • 6JAMIN S,,CHENG J,KURC A,et al.Constrained Mirror Placement on the Internet. Proceedings of the 20th Annu- al Joint Conference of the IEEE Computer and Communications Societies: Apr 22-26,2001 . 2001
  • 7CARLSSON N,EAGER D.Server Selection in Large- Scale Videoon-Demand Systems. ACM Transactions on Multimedia Computing,Communications,and Appli- cations . 2010
  • 8WENDELL P,JIANG Wenjie,FREEDMAN M,et al.DONAR: Decentralized Server Selection for Cloud Serv- ices. ACM SIGCOMM Computer Communication Review . 2010
  • 9YIN Hao,LIU Xuening,MIN Geyong,et al.Content Delivery Networks: A Bridge between Emerging Applica- tions and Future IP Networks. IEEE Network Maga- zine . 2010
  • 10WANG Miao,XU Lisong,RAMAMURTHY B.Linear Programming Models For Multi-Channel P2P Streaming Systems. Proceedings of 2010 IEEE INFOCOM . 2010

共引文献10

同被引文献17

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部