[go: up one dir, main page]

Jia et al., 2022 - Google Patents

Flexible privacy‐preserving machine learning: When searchable encryption meets homomorphic encryption

Jia et al., 2022

Document ID
17076939666723175420
Author
Jia H
Aldeen M
Zhao C
Jing S
Chen Z
Publication year
Publication venue
International Journal of Intelligent Systems

External Links

Snippet

Now various privacy‐preserving techniques have been combined with machine learning to ensure training data security. However, during the training, users were unable to select data and labels adaptively in the server, which made the trained models challenging in meeting …
Continue reading at onlinelibrary.wiley.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30312Storage and indexing structures; Management thereof
    • G06F17/30321Indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30943Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
    • G06F17/30946Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Similar Documents

Publication Publication Date Title
Liang et al. Efficient and secure decision tree classification for cloud-assisted online diagnosis services
Xia et al. EPCBIR: An efficient and privacy-preserving content-based image retrieval scheme in cloud computing
US8819451B2 (en) Techniques for representing keywords in an encrypted search index to prevent histogram-based attacks
Raman et al. Distributed storage meets secret sharing on the blockchain
US10235335B1 (en) Systems and methods for cryptographically-secure queries using filters generated by multiple parties
Salam et al. Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
CN112332979B (en) Ciphertext search method, system and equipment in cloud computing environment
Jia et al. Flexible privacy‐preserving machine learning: When searchable encryption meets homomorphic encryption
MR Alves et al. A framework for searching encrypted databases
Ahmad et al. Convergent encryption enabled secure data deduplication algorithm for cloud environment
Pan et al. Improved CNN‐Based Hashing for Encrypted Image Retrieval
Hoang et al. A multi-server oblivious dynamic searchable encryption framework
Ananthi et al. RETRACTED ARTICLE: FSS-SDD: fuzzy-based semantic search for secure data discovery from outsourced cloud data
Kim et al. Privacy-preserving parallel kNN classification algorithm using index-based filtering in cloud computing
Bahrami et al. A new secure and searchable data outsourcing leveraging a Bucket-Chain index tree
Wang et al. A multi-keyword searchable encryption sensitive data trusted sharing scheme in multi-user scenario
Li et al. Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query
Sreekumari Privacy-preserving keyword search schemes over encrypted cloud data: an extensive analysis
Magdy et al. Privacy preserving search index for image databases based on SURF and order preserving encryption
Muhammad et al. A secure data outsourcing scheme based on Asmuth–Bloom secret sharing
Handa et al. An efficient approach for secure information retrieval on cloud
CN114116715B (en) Storage construction and retrieval method for secret state knowledge graph for protecting confidentiality of data
Bulbul et al. A provably lightweight and secure DSSE scheme, with a constant storage cost for a smart device client
Rahmani et al. A novel secure data outsourcing scheme based on data hiding and secret sharing for relational databases
Li et al. Secure and verifiable multi-owner ranked-keyword search in cloud computing