期刊文献+

云计算环境下朴素贝叶斯安全分类外包方案研究

NAIVE BAYESIAN SECURITY CLASSIFICATION OUTSOURCING SCHEME IN CLOUD COMPUTING ENVIRONMENT
下载PDF
导出
摘要 当前基于大数据环境的机器学习模型训练和使用模式正饱受争议,尤其在用户针对已训练模型输入特征实例得到分类结果的模型使用阶段。一方面用户不愿意在使用过程中暴露自己的输入数据及最终结果,另一方面模型拥有者迫切需要将分类业务外包给云服务器,同时不暴露模型的明文参数。基于此应用场景,提出一种基于同态加密技术及盲化技术的朴素贝叶斯安全分类外包方法,并在云计算环境下实现仿真。整个系统允许模型拥有者加密上传模型,用户与云服务器利用同态性质完成安全多方计算。在多个朴素贝叶斯分类实例上进行仿真,结果表明该方案在不降低分类准确率的前提下实现了针对训练模型、输入数据及分类结果的隐私保护。 The current training and usage patterns of machine learning models based on big data environments are controversial,especially in the model using phase of the classification results obtained by inputting feature instances for trained models.On the one hand,users are reluctant to expose their input data and final results.On the other hand,model owners urgently need to outsource the classification business to the cloud server without exposing the plaintext parameters of the model.Based on this application scenario,this paper proposes a Naive Bayesian security classification outsourcing system based on homomorphic encryption technology and model blinding technology,and implements simulation in cloud computing environment.The entire system allows the model owner to upload the encrypted model,and the user together with the cloud server use the homomorphic nature to perform secure multiparty computing.We simulate on a number of Naive Bayesian classification instances.The results show that the scheme achieves privacy protection for training models,input data and classification results without reducing the classification accuracy.
作者 陈思 Chen Si((Division of Informationization Construction and Management,Nanjing University of Science and Technology,Nanjing 210094,Jiangsu,China)
出处 《计算机应用与软件》 北大核心 2020年第7期275-280,共6页 Computer Applications and Software
基金 国家自然科学基金项目(61572255) 信息安全国家重点实验室开放项目(2017-ZD-01)。
关键词 云计算环境 朴素贝叶斯 同态加密 外包 Cloud computing environment Naive Bayes Homomorphic encryption Outsourcing
  • 相关文献

参考文献3

二级参考文献78

  • 1罗永龙,黄刘生,荆巍巍,徐维江.空间几何对象相对位置判定中的私有信息保护[J].计算机研究与发展,2006,43(3):410-416. 被引量:44
  • 2Big data. Nature, 2008, 455(7209): 1-136.
  • 3Dealing with data. Science,2011,331(6018): 639-806.
  • 4Holland J. Emergence: From Chaos to Order. RedwoodCity,California: Addison-Wesley? 1997.
  • 5Anthony J G Hey. The Fourth Paradigm: Data-intensiveScientific Discovery. Microsoft Research, 2009.
  • 6Phan X H, Nguyen L M,Horiguchi S. Learning to classifyshort and sparse text Web with hidden topics from large-scale data collections//Proceedings of the 17th InternationalConference on World Wide Web. Beijing, China,2008:91-100.
  • 7Sahami M, Heilman T D. A web-based kernel function formeasuring the similarity of short text snippets//Proceedingsof the 15th International Conference on World Wide Web.Edinburgh, Scotland, 2006: 377-386.
  • 8Efron M, Organisciak P,Fenlon K. Improving retrieval ofshort texts through document expansion//Proceedings of the35th International ACM SIGIR Conference on Research andDevelopment in Information Retrieval. Portland, OR, USA,2012: 911-920.
  • 9Hong L,Ahmed A, Gurumurthy S,Smola A J, Tsioutsiou-liklis K. Discovering geographical topics in the twitterstream//Proceedings of the 21st International Conference onWorld Wide Web(WWW 2012). Lyon, France, 2012:769-778.
  • 10Pozdnoukhov A,Kaiser C. Space-time dynamics of topics instreaming text//Proceedings of the 3rd ACM SIGSPATIALInternational Workshop on Location-Based Social Networks.Chicago-IL,USA, 2011: 1-8.

共引文献721

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部