메뉴 건너뛰기




Volumn 65, Issue 5, 2016, Pages 1351-1362

Privacy Preserving Deep Computation Model on Cloud for Big Data Feature Learning

Author keywords

BGN encryption; BGV encryption; Big data; Cloud computing; Deep computation model; High order back propagation; Smart city

Indexed keywords

BACKPROPAGATION; BACKPROPAGATION ALGORITHMS; CLOUD COMPUTING; COMPUTATION THEORY; COMPUTATIONAL EFFICIENCY; CRYPTOGRAPHY; DATA PRIVACY; EFFICIENCY;

EID: 84963853667     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2015.2470255     Document Type: Article
Times cited : (254)

References (56)
  • 1
    • 84902195250 scopus 로고    scopus 로고
    • Smart city architecture: A technology guide for implementation and design challenges
    • W. Rong, X. Zhang, C. Dave, L. Chao, and S. Hao, "Smart city architecture: A technology guide for implementation and design challenges," China Commun., vol. 11, no. 3, pp. 56-69, 2014.
    • (2014) China Commun. , vol.11 , Issue.3 , pp. 56-69
    • Rong, W.1    Zhang, X.2    Dave, C.3    Chao, L.4    Hao, S.5
  • 2
    • 84906841638 scopus 로고    scopus 로고
    • An information framework for creating a smart city through Internet of Things
    • Apr.
    • J. Jin, J. Gubbi, S. Marusic, and M. Palaniswami, "An information framework for creating a smart city through Internet of Things," IEEE Internet Things J., vol. 1, no. 2, pp. 112-121, Apr. 2014.
    • (2014) IEEE Internet Things J. , vol.1 , Issue.2 , pp. 112-121
    • Jin, J.1    Gubbi, J.2    Marusic, S.3    Palaniswami, M.4
  • 4
    • 84879082499 scopus 로고    scopus 로고
    • Trace analysis and mining for smart cities: Issues, methods, and applications
    • Jun.
    • G. Pan, G. Qi, W. Zhang, S. Li, Z. Wu, and L. T. Yang, "Trace analysis and mining for smart cities: Issues, methods, and applications," IEEE Commun. Mag., vol. 51, no. 6, pp. 120-126, Jun. 2013.
    • (2013) IEEE Commun. Mag. , vol.51 , Issue.6 , pp. 120-126
    • Pan, G.1    Qi, G.2    Zhang, W.3    Li, S.4    Wu, Z.5    Yang, L.T.6
  • 5
    • 84879086620 scopus 로고    scopus 로고
    • Bootstrapping smart cities through a selfsustainable model based on big data flows
    • Jun.
    • I. Vilajosana, J. Llosa, B. Martinez, M. Domingo-Prieto, A. Angles, and X. Vilajosana, "Bootstrapping smart cities through a selfsustainable model based on big data flows," IEEE Commun. Mag., vol. 51, no. 6, pp. 128-134, Jun. 2013.
    • (2013) IEEE Commun. Mag. , vol.51 , Issue.6 , pp. 128-134
    • Vilajosana, I.1    Llosa, J.2    Martinez, B.3    Domingo-Prieto, M.4    Angles, A.5    Vilajosana, X.6
  • 6
    • 84923318381 scopus 로고    scopus 로고
    • Big data deep learning: Challenges and perspectives
    • May
    • X. -W. Chen and X. Lin, "Big data deep learning: Challenges and perspectives," IEEE Access, vol. 2, pp. 514-525, May 2014.
    • (2014) IEEE Access , vol.2 , pp. 514-525
    • Chen, X.-W.1    Lin, X.2
  • 7
    • 85032752433 scopus 로고    scopus 로고
    • Modeling and optimization for big data analytics: (Statistical) learning tools for our era of data deluge
    • Sep.
    • K. Slavakis, G. B. Giannakis, and G. Mateos, "Modeling and optimization for big data analytics: (Statistical) learning tools for our era of data deluge," IEEE Signal Process. Mag., vol. 31, no. 5, pp. 18-31, Sep. 2014.
    • (2014) IEEE Signal Process. Mag. , vol.31 , Issue.5 , pp. 18-31
    • Slavakis, K.1    Giannakis, G.B.2    Mateos, G.3
  • 10
    • 84921787304 scopus 로고    scopus 로고
    • Big data machine learning and graph analytics: Current state and future challenges
    • H. H. Huang and H. Liu, "Big data machine learning and graph analytics: Current state and future challenges," in Proc. IEEE Int. Conf. Big Data, 2014, pp. 16-17.
    • (2014) Proc. IEEE Int. Conf. Big Data , pp. 16-17
    • Huang, H.H.1    Liu, H.2
  • 11
    • 84921350571 scopus 로고    scopus 로고
    • A time efficient approach for detecting errors in big sensor data on cloud
    • Feb.
    • C. Yang, C. Liu, X. Zhang, S. Nepal, and J. Chen, "A time efficient approach for detecting errors in big sensor data on cloud," IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 2, pp. 329-339, Feb. 2015.
    • (2015) IEEE Trans. Parallel Distrib. Syst. , vol.26 , Issue.2 , pp. 329-339
    • Yang, C.1    Liu, C.2    Zhang, X.3    Nepal, S.4    Chen, J.5
  • 12
    • 79955537453 scopus 로고    scopus 로고
    • QoS-aware fault-tolerant scheduling for real-time tasks on heterogeneous clusters
    • Jun.
    • X. Zhu, X. Qin, and M. Qiu, "QoS-aware fault-tolerant scheduling for real-time tasks on heterogeneous clusters," IEEE Trans. Comput., vol. 60, no. 6, pp. 800-812, Jun. 2011.
    • (2011) IEEE Trans. Comput. , vol.60 , Issue.6 , pp. 800-812
    • Zhu, X.1    Qin, X.2    Qiu, M.3
  • 13
    • 84890479671 scopus 로고    scopus 로고
    • A mechanism design approach to resource procurement in cloud computing
    • Jan.
    • A. S. Prasad and S. Rao, "A mechanism design approach to resource procurement in cloud computing," IEEE Trans. Comput., vol. 63, no. 1, pp. 17-30, Jan. 2014.
    • (2014) IEEE Trans. Comput. , vol.63 , Issue.1 , pp. 17-30
    • Prasad, A.S.1    Rao, S.2
  • 14
    • 84870870355 scopus 로고    scopus 로고
    • Agent-based cloud computing
    • Oct.-Dec.
    • S. M. Kwang, "Agent-based cloud computing," IEEE Trans. Serv. Comput., vol. 5, no. 4, pp. 564-577, Oct.-Dec. 2012.
    • (2012) IEEE Trans. Serv. Comput. , vol.5 , Issue.4 , pp. 564-577
    • Kwang, S.M.1
  • 15
    • 84892142922 scopus 로고    scopus 로고
    • Computer science: The learning machines
    • N. Jones, "Computer science: The learning machines," Nature, vol. 505, no. 7482, pp. 146-148, 2014.
    • (2014) Nature , vol.505 , Issue.7482 , pp. 146-148
    • Jones, N.1
  • 17
    • 84946898154 scopus 로고    scopus 로고
    • ANGEL: Agent-based scheduling for real-time tasks in virtualized clouds
    • [Online]
    • X. Zhu, C. Chen, Laurence T. Yang, and Y. Xiang, "ANGEL: Agent-based scheduling for real-time tasks in virtualized clouds," IEEE Trans. Comput., [Online]. Available: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7054494, 2015.
    • (2015) IEEE Trans. Comput.
    • Zhu, X.1    Chen, C.2    Yang, L.T.3    Xiang, Y.4
  • 18
    • 84927696216 scopus 로고    scopus 로고
    • A weighted kernel possibilistic C-means algorithm based on cloud computing for clustering big data
    • Q. Zhang and Z. Chen, "A weighted kernel possibilistic C-means algorithm based on cloud computing for clustering big data," Int. J. Commun. Syst., vol. 27, no. 9, pp. 1378-1391, 2014.
    • (2014) Int. J. Commun. Syst. , vol.27 , Issue.9 , pp. 1378-1391
    • Zhang, Q.1    Chen, Z.2
  • 19
    • 80052119994 scopus 로고    scopus 로고
    • An architecture for parallel topic models
    • A. Smola and S. Narayanamurthy, "An architecture for parallel topic models," Proc. VLDB Endowment, vol. 3, no. 1-2, pp. 703-710, 2010.
    • (2010) Proc. VLDB Endowment , vol.3 , Issue.1-2 , pp. 703-710
    • Smola, A.1    Narayanamurthy, S.2
  • 20
    • 84862684679 scopus 로고    scopus 로고
    • Large-scale machine learning at Twitter
    • J. Lin and A. Kolcz, "Large-scale machine learning at Twitter," in Proc. ACM Conf. Manage. Data, 2012, pp. 793-804.
    • (2012) Proc. ACM Conf. Manage. Data , pp. 793-804
    • Lin, J.1    Kolcz, A.2
  • 21
    • 84901924319 scopus 로고    scopus 로고
    • Privacy preserving back-propagation neural network learning made practical with cloud computing
    • Jan.
    • J. Yuan and S. Yu, "Privacy preserving back-propagation neural network learning made practical with cloud computing," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 212-221, Jan. 2014.
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.1 , pp. 212-221
    • Yuan, J.1    Yu, S.2
  • 25
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Y. Lindelland B. Pinkas, "Privacy preserving data mining," J. Cryptol., vol. 15, no. 3, pp. 177-206, 2002.
    • (2002) J. Cryptol. , vol.15 , Issue.3 , pp. 177-206
    • Lindelland, Y.1    Pinkas, B.2
  • 26
    • 77952334884 scopus 로고    scopus 로고
    • Using randomized response techniques for privacy preserving data mining
    • W. Du and Z. Zhan, "Using randomized response techniques for privacy preserving data mining," in Proc. ACM Int. Conf. Knowl. Discovery Data Mining, 2003, pp. 505-510.
    • (2003) Proc. ACM Int. Conf. Knowl. Discovery Data Mining , pp. 505-510
    • Du, W.1    Zhan, Z.2
  • 27
    • 12244255356 scopus 로고    scopus 로고
    • Privacy-preserving Bayesian network structure computation on distributed heterogeneous data
    • R. Wright and Z. Yang, "Privacy-preserving Bayesian network structure computation on distributed heterogeneous data," in Proc. ACM Int. Conf. Knowl. Discovery Data Mining, 2004, pp. 713-718.
    • (2004) Proc. ACM Int. Conf. Knowl. Discovery Data Mining , pp. 713-718
    • Wright, R.1    Yang, Z.2
  • 28
    • 2942536415 scopus 로고    scopus 로고
    • Privacy preserving naive Bayes classifier for vertically partitioned data
    • J. Vaidya and C. Clifton, "Privacy preserving naive Bayes classifier for vertically partitioned data," in Proc. SIAM Int. Conf. Data Mining, 2004, pp. 522-526.
    • (2004) Proc. SIAM Int. Conf. Data Mining , pp. 522-526
    • Vaidya, J.1    Clifton, C.2
  • 32
    • 84908564438 scopus 로고    scopus 로고
    • A tensor-based approach for big data representation and dimensionality reduction
    • Sep.
    • L. Kuang, F. Hao, L. T. Yang, M. Lin, C. Luo, and G. Min, "A tensor-based approach for big data representation and dimensionality reduction," IEEE Trans. Emerging Topics Comput., vol. 2, no. 3, pp. 280-291, Sep. 2014.
    • (2014) IEEE Trans. Emerging Topics Comput. , vol.2 , Issue.3 , pp. 280-291
    • Kuang, L.1    Hao, F.2    Yang, L.T.3    Lin, M.4    Luo, C.5    Min, G.6
  • 34
    • 84879854889 scopus 로고    scopus 로고
    • Representation learning: A review and new perspectives
    • Aug.
    • Y. Bengio, A. Courville, and P. Vincent, "Representation learning: A review and new perspectives," IEEE Trans. Pattern Anal. Mach. Intell., vol. 35, no. 8, pp. 1798-1828, Aug. 2013.
    • (2013) IEEE Trans. Pattern Anal. Mach. Intell. , vol.35 , Issue.8 , pp. 1798-1828
    • Bengio, Y.1    Courville, A.2    Vincent, P.3
  • 35
    • 78149327155 scopus 로고    scopus 로고
    • Tensor distance based multilinear locality-preserved maximum information embedding
    • Nov.
    • Y. Liu, Y. Liu, and K. Chan, "Tensor distance based multilinear locality-preserved maximum information embedding," IEEE Trans. Neural Netw., vol. 21, no. 11, pp. 1848-1854, Nov. 2010.
    • (2010) IEEE Trans. Neural Netw. , vol.21 , Issue.11 , pp. 1848-1854
    • Liu, Y.1    Liu, Y.2    Chan, K.3
  • 36
    • 0005301490 scopus 로고
    • On data banks and privacy homomorphisms
    • R. L. Rivest, L. Adleman, and M. L. Dertouzos, "On data banks and privacy homomorphisms," Found. Secure Comput., vol. 4, no. 11, pp. 169-180, 1978.
    • (1978) Found. Secure Comput. , vol.4 , Issue.11 , pp. 169-180
    • Rivest, R.L.1    Adleman, L.2    Dertouzos, M.L.3
  • 37
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 39
    • 70350642087 scopus 로고    scopus 로고
    • Fully homomorphic encryption using ideal lattices
    • C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proc. ACM Symp. Theory Comput., 2009, pp. 169-178.
    • (2009) Proc. ACM Symp. Theory Comput. , pp. 169-178
    • Gentry, C.1
  • 41
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Proc. Int. Conf. Theory Appl. Cryptographic Techn., 1999, pp. 223-238.
    • (1999) Proc. Int. Conf. Theory Appl. Cryptographic Techn. , pp. 223-238
    • Paillier, P.1
  • 43
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. El Gamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," in Proc. Int. Conf. Theory Appl. Cryptographic Techn., 1985, pp. 10-18.
    • (1985) Proc. Int. Conf. Theory Appl. Cryptographic Techn. , pp. 10-18
    • El Gamal, T.1
  • 44
    • 84865507640 scopus 로고    scopus 로고
    • Fully homomorphic encryption without modulus switching from classical GapSVP
    • Z. Brakerski, "Fully homomorphic encryption without modulus switching from classical GapSVP," in Proc. 32nd Annu. Cryptol. Conf. Adv. Cryptol., 2012, pp. 868-886.
    • (2012) Proc. 32nd Annu. Cryptol. Conf. Adv. Cryptol. , pp. 868-886
    • Brakerski, Z.1
  • 45
    • 84884485247 scopus 로고    scopus 로고
    • Homomorphic encryption from learning with errors: Conceptually-simpler, asymptoticallyfaster, attribute-based
    • C. Gentry, A. Sahai, and B. Waters, "Homomorphic encryption from learning with errors: Conceptually-simpler, asymptoticallyfaster, attribute-based," in Proc. 33rd Annu. Cryptol. Conf. Adv. Cryptol., 2013, pp. 75-92.
    • (2013) Proc. 33rd Annu. Cryptol. Conf. Adv. Cryptol. , pp. 75-92
    • Gentry, C.1    Sahai, A.2    Waters, B.3
  • 46
    • 84862283411 scopus 로고    scopus 로고
    • An analysis of single-layer networks in unsupervised feature learning
    • A. Coates, A. Y. Ng, and H. Lee, "An analysis of single-layer networks in unsupervised feature learning," in Proc. Int. Conf. Artif. Intell. Statist., 2011, pp. 215-223.
    • (2011) Proc. Int. Conf. Artif. Intell. Statist. , pp. 215-223
    • Coates, A.1    Ng, A.Y.2    Lee, H.3
  • 48
    • 84907500988 scopus 로고    scopus 로고
    • Deep architecture for traffic flow prediction: Deep belief networks with multitask learning
    • Oct.
    • W. Huang, G. Song, H. Hong, and K. Xie, "Deep architecture for traffic flow prediction: Deep belief networks with multitask learning," IEEE Trans. Intell. Transp. Syst., vol. 15, no. 5, pp. 2191-2201, Oct. 2014.
    • (2014) IEEE Trans. Intell. Transp. Syst. , vol.15 , Issue.5 , pp. 2191-2201
    • Huang, W.1    Song, G.2    Hong, H.3    Xie, K.4
  • 51
  • 52
    • 79960618403 scopus 로고    scopus 로고
    • A protocol for privacy preserving neural network learning on horizontal partitioned data
    • N. Schlitter, "A protocol for privacy preserving neural network learning on horizontal partitioned data," in Proc. Privacy Statist. Databases, 2008, pp. 298-315.
    • (2008) Proc. Privacy Statist. Databases , pp. 298-315
    • Schlitter, N.1
  • 53
    • 70350345197 scopus 로고    scopus 로고
    • Privacy-preserving backpropagation neural network learning
    • Oct.
    • T. Chen and S. Zhong, "Privacy-preserving backpropagation neural network learning," IEEE Trans. Neural Netw., vol. 20, no. 10, pp. 1554-1564, Oct. 2009.
    • (2009) IEEE Trans. Neural Netw. , vol.20 , Issue.10 , pp. 1554-1564
    • Chen, T.1    Zhong, S.2
  • 54
    • 79251640709 scopus 로고    scopus 로고
    • Privacy preserving backpropagation neural network learning over arbitrarily partitioned data
    • Feb.
    • A. Bansal, T. Chen, and S. Zhong, "Privacy preserving backpropagation neural network learning over arbitrarily partitioned data," Neural Comput. Appl., vol. 20, no. 1, pp. 143-150, Feb. 2011.
    • (2011) Neural Comput. Appl. , vol.20 , Issue.1 , pp. 143-150
    • Bansal, A.1    Chen, T.2    Zhong, S.3
  • 56
    • 33750908650 scopus 로고    scopus 로고
    • A privacy-preserving protocol for neural-network-based computation
    • M. Barni, C. Orlandi, and A. Piva, "A privacy-preserving protocol for neural-network-based computation," in Proc. 8th Workshop Multimedia Security, 2006, pp. 146-151.
    • (2006) Proc. 8th Workshop Multimedia Security , pp. 146-151
    • Barni, M.1    Orlandi, C.2    Piva, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.