Jia et al., 2022 - Google Patents
Flexible privacy‐preserving machine learning: When searchable encryption meets homomorphic encryptionJia et al., 2022
- Document ID
- 17076939666723175420
- Author
- Jia H
- Aldeen M
- Zhao C
- Jing S
- Chen Z
- Publication year
- Publication venue
- International Journal of Intelligent Systems
External Links
Snippet
Now various privacy‐preserving techniques have been combined with machine learning to ensure training data security. However, during the training, users were unable to select data and labels adaptively in the server, which made the trained models challenging in meeting …
- 238000010801 machine learning 0 title abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30312—Storage and indexing structures; Management thereof
- G06F17/30321—Indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30943—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
- G06F17/30946—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liang et al. | Efficient and secure decision tree classification for cloud-assisted online diagnosis services | |
Xia et al. | EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing | |
US8819451B2 (en) | Techniques for representing keywords in an encrypted search index to prevent histogram-based attacks | |
Raman et al. | Distributed storage meets secret sharing on the blockchain | |
US10235335B1 (en) | Systems and methods for cryptographically-secure queries using filters generated by multiple parties | |
Salam et al. | Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage | |
CN112332979B (en) | Ciphertext search method, system and equipment in cloud computing environment | |
Jia et al. | Flexible privacy‐preserving machine learning: When searchable encryption meets homomorphic encryption | |
MR Alves et al. | A framework for searching encrypted databases | |
Ahmad et al. | Convergent encryption enabled secure data deduplication algorithm for cloud environment | |
Pan et al. | Improved CNN‐Based Hashing for Encrypted Image Retrieval | |
Hoang et al. | A multi-server oblivious dynamic searchable encryption framework | |
Ananthi et al. | RETRACTED ARTICLE: FSS-SDD: fuzzy-based semantic search for secure data discovery from outsourced cloud data | |
Kim et al. | Privacy-preserving parallel kNN classification algorithm using index-based filtering in cloud computing | |
Bahrami et al. | A new secure and searchable data outsourcing leveraging a Bucket-Chain index tree | |
Wang et al. | A multi-keyword searchable encryption sensitive data trusted sharing scheme in multi-user scenario | |
Li et al. | Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query | |
Sreekumari | Privacy-preserving keyword search schemes over encrypted cloud data: an extensive analysis | |
Magdy et al. | Privacy preserving search index for image databases based on SURF and order preserving encryption | |
Muhammad et al. | A secure data outsourcing scheme based on Asmuth–Bloom secret sharing | |
Handa et al. | An efficient approach for secure information retrieval on cloud | |
CN114116715B (en) | Storage construction and retrieval method for secret state knowledge graph for protecting confidentiality of data | |
Bulbul et al. | A provably lightweight and secure DSSE scheme, with a constant storage cost for a smart device client | |
Rahmani et al. | A novel secure data outsourcing scheme based on data hiding and secret sharing for relational databases | |
Li et al. | Secure and verifiable multi-owner ranked-keyword search in cloud computing |