基于云隐私保护的支持向量机训练外包
Support Vector Machine Training Outsourcing Based on Cloud Privacy-Preserving
摘要: 支持向量机(Support Vector Machine, SVM)是一种监督式学习机器学习分类算法,自出现以来,已经成为应用最广泛的分类算法。本文探讨了云环境下隐私保护的SVM训练问题,并提出了一种新的隐私保护的SVM外包训练(PPOSVM)协议。与已有的方案相比,除了隐藏数据样本的隐私性,新协议首次考虑了样本数据与标签对应关系的隐私性,隐藏了密文数据的访问模式。同时,采用豪斯霍尔德变换以及置换矩阵进行加密操作,使得新协议具有很高的效率。严格论证了协议的输入输出隐私性以及效率,同时,通过广泛的实验分析验证了所提协议的实际性能,进一步证实了理论分析。
Abstract: Support Vector Machine (SVM) is a supervised learning machine learning classification algorithm. Since its emergence, it has become the most widely used classification algorithm. This paper discusses the problem of SVM training for privacy-preserving in the cloud environment, and proposes a new privacy-preserving SVM outsourcing training protocol. Compared with the existing schemes, in addition to hiding the privacy of data samples, the new protocol considers the privacy of the corresponding relationship between sample data and labels for the first time, and hides the access mode of ciphertext data. At the same time, the use of Householder transformation and permutation ma-trix for encryption operation makes the new protocol highly efficient. The input and output privacy and efficiency of the protocol are strictly demonstrated. At the same time, the actual performance of the proposed protocol is verified through extensive experimental analysis, which further confirms the theoretical analysis.
文章引用:邵宇航. 基于云隐私保护的支持向量机训练外包[J]. 计算机科学与应用, 2021, 11(12): 3038-3050. https://doi.org/10.12677/CSA.2021.1112307

参考文献

[1] Gantz, J. and Reinsel, D. (2011) Extracting Value from Chaos. IDC Iview, 1142, 1-12.
[2] Lyu, Z., Li, J., Dong, C., Wang, Y., Li, H. and Xu, Z. (2021) DeepPTP: A Deep Pedestrian Trajectory Prediction Model for Traffic Intersection. KSII Transactions on Internet and Information Systems (TIIS), 15, 2321-2338. [Google Scholar] [CrossRef
[3] Lyu, Z., Li, J., Li, H., Xu, Z. and Wang, Y. (2021) Blind Travel Pre-diction Based on Obstacle Avoidance in Indoor Scene. Wireless Communications and Mobile Computing, 2021, Article ID: 5536386. [Google Scholar] [CrossRef
[4] Luo, C., Zhang, K., Salinas, S. and Li, P. (2017) Secfact: Secure Large-Scale QR and LU Factorizations. IEEE Transactions on Big Data, 7, 796-807, [Google Scholar] [CrossRef
[5] Lv, Z., Li, J., Dong, C. and Xu, Z. (2021) DeepSTF: A Deep Spatial-Temporal Forecast Model of Taxi Flow. The Computer Journal, Article No. bxab178. [Google Scholar] [CrossRef
[6] Lv, Z., Li, J., Dong, C., Li, H. and Xu, Z. (2021) Deep Learning in the COVID-19 Epidemic: A Deep Model for Urban Traffic Revitalization Index. Data & Knowledge Engineering, 135, Arti-cle ID: 101912. [Google Scholar] [CrossRef] [PubMed]
[7] Devikanniga, D., Ramu, A. and Haldorai, A. (2020) Efficient Diagnosis of Liver Disease Using Support Vector Machine Optimized with Crows Search Algorithm. EAI Endorsed Transactions on Energy Web, 7, Article No. e10.
[8] Farhadian, M., Shokouhi, P. and Torkzaban, P. (2020) A Deci-sion Support System Based on Support Vector Machine for Diagnosis of Periodontal Disease. BMC Research Notes, 13, Article No. 337. [Google Scholar] [CrossRef] [PubMed]
[9] Sivaram, M., Lydia, E.L., Pustokhina, I.V., Alexandrovich Pustokhin, D., Elhoseny, M., Prasad Joshi, G., et al. (2020) An Optimal Least Square Support Vector Machine Based Earnings Prediction of Blockchain Financial Products. IEEE Access, 8, 120321-120330. [Google Scholar] [CrossRef
[10] Byvatov, E. and Schneider, G. (2003) Support Vector Ma-chine Applications in Bioinformatics. Applied Bioinformatics, 2, 67-77.
[11] Wang, J., Wu, L., Wang, H., Choo, K.-K.R. and He, D. (2020) An Efficient and Privacy-Preserving Outsourced Support Vector Machine Training for Internet of Medical Things. IEEE Internet of Things Journal, 8, 458-473. [Google Scholar] [CrossRef
[12] Liu, X., Deng, R.H., Choo, K.K.R. and Yang, Y. (2018) Priva-cy-Preserving Outsourced Support Vector Machine Design for Secure Drug Discovery. IEEE Transactions on Cloud Computing, 8, 610-622. [Google Scholar] [CrossRef
[13] Lin, K.-P. and Chen, M.-S. (2010) Privacy-Preserving Outsourc-ing Support Vector Machines with Random Transformation. Proceedings of the 16th ACM SIGKDD International Con-ference on Knowledge Discovery and Data Mining, Washington DC, 25-28 July 2010, 363-372. [Google Scholar] [CrossRef
[14] González-Serrano, F.J., Navia-Vázquez, Á. and Amor-Martín, A. (2017) Training Support Vector Machines with Privacy-Protected Data. Pattern Recognition, 72, 93-107. [Google Scholar] [CrossRef
[15] Laur, S., Lipmaa, H. and Mielikäinen, T. (2006) Cryptograph-ically Private Support Vector Machines. Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, 20-23 August 2006, 618-624. [Google Scholar] [CrossRef
[16] Omer, M.Z., Gao, H. and Sayed, F. (2016) Privacy Preserving in Distributed SVM Data Mining on Vertical Partitioned Data. 2016 3rd International Conference on Soft Computing & Machine Intelligence (ISCMI), Dubai, 23-25 November 2016, 84-89. [Google Scholar] [CrossRef
[17] Shen, M., Tang, X., Zhu, L., Du, X. and Guizani, M. (2019) Priva-cy-Preserving Support Vector Machine Training over Blockchain-Based Encrypted IoT Data in Smart Cities. IEEE In-ternet of Things Journal, 6, 7702-7712. [Google Scholar] [CrossRef
[18] Cortes, C. and Vapnik, V. (1995) Support-Vector Networks. Machine Learning, 20, 273-297. [Google Scholar] [CrossRef
[19] Knuth, D.E. (1997) The Art of Computer Programming. Pearson Educa-tion, Loondon.
[20] Platt, J. (1998) Sequential Minimal Optimization: A Fast Algorithm for Training Support Vector Machines. Microsoft, Redmond.
[21] Chang, C.C. (2001) LIBSVM: A Library for Support Vector Machines. http://www.csie.ntu.edu.tw/cjlin/libsvm
[22] Maekawa, T., Kawamura, A., Nakachi, T. and Kiya, H. (2019) Priva-cy-Preserving Support Vector Machine Computing Using Random Unitary Transformation. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 102, 1849-1855. [Google Scholar] [CrossRef