期刊文献+

云环境下基于秘密共享的安全外包主成分分析方案 被引量:3

A Principal Component Analysis Scheme for Security Outsourcing in Cloud Environment Based on Secret Sharing
下载PDF
导出
摘要 主成分分析技术的计算开销较大,本地设备一般无法负担,常需要将计算任务进行外包,而外包计算的数据安全问题已成为云计算安全领域的一个研究热点。文章提出一种云环境下基于秘密共享的安全外包主成分分析方案,该方案基于加法秘密共享技术,设计了安全除法和安全平方根计算协议。通过两台云服务器协同执行协方差矩阵、Lanczos、Householder等安全协议计算,实现了主成分分析安全外包计算。与其他安全外包计算方案相比,文章所提方案可以更好地支持客户端离线和多方数据聚合,其计算开销更小,并通过实验验证了方案的有效性。 The computational overhead of principal component analysis is so high that local devices cannot afford it and often require secure outsourcing of computational tasks.The data security issue in outsourcing computation has gradually become a difficult point for cloud computing security research.This paper proposed a secure outsourcing scheme based on secret sharing in cloud environment,which was based on additive secret sharing technology and designed with secure division and secure square root computation protocols.The PCA secure outsourcing computation could be finished by two cloud servers collaboratively performing the covariance matrix,Lanczos,Householder and other secure protocols.Compared with other secure outsourcing computation schemes,this scheme can better support client offline and multi-party data aggregation with better computational overhead,and the experiments verified the effectiveness of the scheme.
作者 马敏 付钰 黄凯 MA Min;FU Yu;HUANG Kai(Department of Information Security,Naval University of Engineering,Wuhan 430033,China;Department of Software Engineering,The Hubei Open University,Wuhan 430074,China;College of Joint Operation,National Defense University,Shijiazhuang 050084,China)
出处 《信息网络安全》 CSCD 北大核心 2023年第4期61-71,共11页 Netinfo Security
基金 国家自然科学基金[62102422]。
关键词 数据安全 云计算 外包计算 秘密共享 主成分分析 data security cloud computing outsourced computing secret sharing principal component analysis
  • 相关文献

参考文献5

二级参考文献109

  • 1郭均鹏,李汶华.基于误差理论的区间主成分分析及其应用[J].数理统计与管理,2007,26(4):636-640. 被引量:6
  • 2CULNAN M J, ARMSTRONG P K. Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation[J]. Organization Science, 1999, 10(1): 104-115.
  • 3DINEV T, HART P. Privacy concems and intemet use-a model of trade-off factors[C]//,~cademy of Management. c2003:1-6.
  • 4LI H, SARATHY R, XU H. Understanding situational online informa- tion disclosure as a privacy calculus[J]. Journal of Computer Informa- tion Systems, 2010, 51(1): 62-71.
  • 5KEHR F, KOWATSCH T, WENTZEL D, et al. Blissfully ignorant: the effects of general privacy concerns, general institutional trust, and af- fect in the privacy calculus[J]. Information Systems Journal, 2015, 25(6): 607-635.
  • 6MACHANAVAJJHALA A, KIFER D, GEHRKE J, ~t al. /-diversity: privacy beyond k-anonymity[J]. ACM Transactions on Knowledge Discovery from Data (TKDD), 2007, 1(1): 3.
  • 7AGRAWAL D, AGGARWAL C C. On the design and quantification of privacy preserving data mining algorithms[C]//The 20th ACM SIG- MOD-SIGACT-SIGART Symposium on Principles of Database Sys- tems. ACM, c2001 : 247-255.
  • 8LIU K, KARGUPTA H, RYAN J. Random projection-based multipli- eative data perturbation for privacy preserving distributed data min- ing[J]. IEEE Transactions on Knowledge and Data Engineering, 2006, 18(1): 92-106.
  • 9OLIVEIRA S R M, ZAIANE O R. Privacy preserving clustering by data transformation[C]//The 18th Brazilian Symposium on Databases. c2003:304-318.
  • 10OLIVEIRA S R M, ZAIANE O R. Privacy preserving clustering by object similarity-based representation and dimensionality reduction transformation[C]/Fl'he Workshop on Privacy and Security Aspects of Data Mining. e2004:21-30.

共引文献317

同被引文献13

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部