Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme
Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme
Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme
Encryption Scheme:
Abstract:
As the rapidly growing volume of data are beyond the capabilities of
many computing infrastructures, to securely process them on cloud has
become a preferred solution which can both utilize the powerful
capabilities provided by cloud and protect data privacy. This paper
presents an approach to securely decompose a tensor, a mathematical
model widely used in data-intensive applications, to a core tensor
multiplied with a certain number of truncated orthogonal bases. The
unstructured, semi-structured, and structured data are represented as
low-order sub-tensors which are then encrypted using the fully
homomorphic encryption scheme. A unified high-order cipher tensor
model is constructed by collecting all the cipher sub-tensors and
embedding them to a base tensor space. The cipher tensor is
decomposed through a proposed secure algorithm, in which the square
root operations are eliminated during the Lanczos procedure. Theoretical
analyses of the algorithm in terms of time complexity, memory usage,
decomposition accuracy, and data security are provided. Experimental
results demonstrate that the approach can securely decompose a tensor.
With the advancement of fully homomorphic encryption scheme, it can
be expected that the secure tensor decomposition approach has the
potential to be applied on cloud for privacy-preserving data processing.
Existing System:
Cloud Computing is a concept that has many computers
interconnected through a real time network like internet. Cloud
computing is a set of IT services that are provided to a customer over a
network on a leased basis and with the ability to scale up or down their
service requirements. Cloud computing provides facility to share
distributed resources and services that belong to different organizations
or sites. In private cloud system, information is shared among the
persons who are in that cloud. In this paper we have proposed new
authentication system for cloud computing platform. The Proposed
technique based on encrypted one time password (EOTP). In the
proposed technique one time password is encrypted by public key of
user to obtain Encrypted one time password (EOTP). In the proposed
system third party is not required.
Proposed System:
The size of data in many fields is rapidly increasing towards
Terabyte level or even Petabyte level, as well as the data structures are
becoming more varied. The large scale heterogeneous data have posed
great challenges on current computing infrastructures, and new
approaches are in urgent need to address them. A cloud infrastructure is
the collection of hardware and software which can provide capabilities
to the consumers on a pay-per-use or chargeper-use basis. Many
heterogenous data are modeled as tensors .a type of high dimension
matrix widely used in many applications. Tensor decomposition is a
powerful tool to extract valuable information from large scale raw data.
This paper presents a new computing approach which can securely
decompose the tensor model generated from large scale heterogeneous
data
We present a holistic framework to address the problem of
secure tensor decomposition on cloud.
The framework not only allows us to utilize the powerful
computational capabilities of the cloud, but also ensures data
security during the process of tensor decomposition.
We introduce a Unified Cipher Tensor (UCT) model for
heterogeneous data representation. The detailed procedures of
how to encrypt the low-order sub-tensors constructed from
heterogeneous data as cipher counterparts using the fully
encryption scheme, as well as how to embed them to a base
tensor space to generate a unified cipher tensor model are
illustrated in this paper.
We propose to employ the Lanczos method to decompose the
generated cipher tensor model to a core tensor and a certain number of
truncated orthogonal bases. A secure tensor decomposition algorithm is
designed in which the nonhomomorphic square root operations are
removed during the Lanczos procedure. Theoretical analyses of the
algorithm in terms of time complexity, memory usage, decomposition
accuracy, and data security are provided. A tensor model is used to
illustrate the linear relations between the scalars, vectors, and other
tensors. Tensor is a generalization of a matrix model, which is usually
called multidimensional array. This on tensor decomposition, fully
homomorphic encryption scheme, and Lanczos method. Parallel
implementation of Lanczos algorithms are studied to improve the
efficiency. Many studies on tensor decomposition, fully homomorphic
encryption, and Lanczos method have been performed over the past few
decades. However, all the investigations mentioned above are
concentrated on special topics, no systematic research has been
dedicated to secure tensor decomposition of large scale heterogeneous
data.
Architecture Diagram:
System Requirements
Hard Disk - 20 GB
Monitor - SVGA
Scripts : JavaScript,jquery,ajax
CONCLUSION:
Aiming to propose an efficient approach that can securely
process large scale heterogeneous data, this paper formalizes the secure
tensor decomposition problem, and proposes a holistic solution
framework to address it. A unified cipher tensor model is presented to
integrate all the encrypted low-order sub-tensors as a unified model.
Concise examples are provided for illustrating the process of cipher
tensor construction and unfolding. A Lanczos-based secure tensor
decomposition algorithm is introduced, in which the non-homomorphic
square root operations in Lanczos procedure are removed. Theoretical
analyses in terms of time complexity, memory usage, decomposition
accuracy, and data security are provided. Some very preliminary
experiments are carried out to evaluate the performance of the presented
methods. The results support that the proposed approach is feasible and
can pave a way for secure data processing on cloud.