期刊文献+

基于安全两方计算的隐私保护线性回归算法 被引量:2

Privacy-Preserving Linear Regression Algorithm Based on Secure Two-Party Computation
下载PDF
导出
摘要 随着数据安全与隐私泄露事件频发,泄露规模连年加剧,如何保证机器学习中数据和模型参数的隐私引发科学界和工业界的广泛关注。针对本地存储计算资源的有限性及云平台的不可信性所带来的数据隐私问题,基于秘密共享技术提出了一种安全两方计算的隐私保护线性回归算法。利用加法同态加密和加法掩码实现了秘密共享值的乘法计算协议,结合小批量梯度下降算法,最终实现了在两个非共谋的云服务器上的安全线性回归算法。实验结果表明,该方案同时保护了线性回归算法训练及预测阶段中的数据及模型参数,且模型预测性能与在明文域中进行训练的模型相近。 With the frequent occurrence of data security and privacy leaks and the increasing scale of leaks year after year,how to ensure the privacy of data and model parameters in machine learning has aroused widespread concern in the scientific and industrial community.Aiming at the data privacy problem caused by the limitation of local storage and com-puting resources and the untrustworthiness of cloud platforms,this paper proposes a privacy protection linear regression algorithm for secure two-party computation based on secret sharing technology.This paper uses additive homomorphic encryption and additive masks to realize a multiplication calculation protocol of the secret shared values,and combines the mini-batch gradient descent algorithm to realize the secure linear regression algorithm on two non-collusive cloud servers.The experimental results show that the scheme protects the data and model parameters in the training and predic-tion phases of the linear regression algorithm at the same time,and the model prediction performance is similar to the model trained in the plaintext domain.
作者 魏立斐 李梦思 张蕾 陈聪聪 陈玉娇 王勤 WEI Lifei;LI Mengsi;ZHANG Lei;CHEN Congcong;CHEN Yujiao;WANG Qin(College of Information,Shanghai Ocean University,Shanghai 201306,China)
出处 《计算机工程与应用》 CSCD 北大核心 2021年第22期139-146,共8页 Computer Engineering and Applications
基金 国家自然科学基金(61972241,61802248,61672339) 上海市自然科学基金面上项目(18ZR1417300)。
关键词 线性回归 安全两方计算 秘密共享 加法同态加密 隐私保护 linear regression secure two-party computation secret sharing addition homomorphic encryption privacy protection
  • 相关文献

参考文献9

二级参考文献50

  • 1罗文俊,李祥.多方安全矩阵乘积协议及应用[J].计算机学报,2005,28(7):1230-1235. 被引量:34
  • 2Yao A. C. Protocols for secure computation[C]. Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science, 1982: 160- 164.
  • 3Wenliang Du. Privacy-preserving cooperative scientific computations[C]. Proceedings of the computer security of foundations workshop,2001: 273-282.
  • 4K. Nissim and E. Weinreb. Communication efficient secure linear algebra[C]. In the Third Theory of Cryptography Conference, 2006: 522- 541.
  • 5E. Kiltz, P. Mohassel, E. Weinreb et al. Secure linear algebra using linearly recurrent sequences[C]. In the 4th Theory of Cryptography Conference, Amsterdam, The Netherlands, 2007: 291-310.
  • 6P. Pallier. Public-key cryptosystems based on composite degree residuosity classes[C]. In Advances in Cryptology-EUROCRYPT, 1999: 223-238.
  • 7Open Cloud Manifesto. http://www.opencloudmanifesto.org . 2010
  • 8Leavitt N.Is Cloud computing really ready for prime time. IEEE Computer . 2009
  • 9Armbrust M,Fox A,Griffith R,et al.Above the Clouds:A berkeley view of cloud computing. http://www.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS2009-28.html . 2009
  • 10Bowers K D,Juels A,Oprea A.HAIL:A high-availability and integrity layer for cloud storage. Proc of the16th ACM Conf on Computer and Communications Security . 2009

共引文献151

同被引文献24

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部