[1]逯绍锋,胡玉龙,逯跃锋*.保护隐私的集合相似性度量协同计算协议[J].计算机技术与发展,2023,33(01):137-143.[doi:10. 3969 / j. issn. 1673-629X. 2023. 01. 021]
 LU Shao-feng,HU Yu-long,LU Yue-feng,et al.Privacy Preserving Set Similarity Measurement Collaborative Computing Protocol[J].,2023,33(01):137-143.[doi:10. 3969 / j. issn. 1673-629X. 2023. 01. 021]
点击复制

保护隐私的集合相似性度量协同计算协议()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
33
期数:
2023年01期
页码:
137-143
栏目:
网络空间安全
出版日期:
2023-01-10

文章信息/Info

Title:
Privacy Preserving Set Similarity Measurement Collaborative Computing Protocol
文章编号:
1673-629X(2023)01-0137-07
作者:
逯绍锋1 胡玉龙2 逯跃锋34*
1. 东北大学 计算机科学与工程学院,辽宁 沈阳 110189;
2. 中国交通通信信息中心,北京 100011;
3. 山东理工大学 建筑工程学院,山东 淄博 255049;
4. 中国科学院 地理科学与资源研究所资源与环境信息系统国家重点实验室,北京 100101
Author(s):
LU Shao-feng1 HU Yu-long2 LU Yue-feng3 4*
1. School of Computer Science and Engineering,Northeastern University,Shenyang 110189,China;
2. China Transport Telecommunications & Information Center,Beijing 100011,China;
3. School of Civil and Architectural Engineering,Shandong University of Technology,Zibo 255049,China;
4. State Key Laboratory of Resources and Environmental Information System,Institute of Geographical Sciences and Natural Resources Research,Chinese Academy of Sciences,Beijing 100101,China
关键词:
隐私保护安全多方计算杰卡德距离集合相似性度量机器学习
Keywords:
privacy-preservingsecurity multi-party computationJaccard distanceset similarity measurementmachine learning
分类号:
TP309
DOI:
10. 3969 / j. issn. 1673-629X. 2023. 01. 021
文献标志码:
A
摘要:
集合相似性度量是机器学习领域的基本问题之一,研究如何在保护数据隐私的前提下计算两个集合间的相似性问题,在保护数据隐私的机器学习、图形识别、生物信息学等方面有着重要的理论意义与应用价值。 在机器学习中估算不同样本集合之间的相似性时,通常通过计算集合相似度来对样本之间的相似程度进行估算,这一类集合之间的相似度统称为集合距离。 其中,最常用到的集合距离就是杰卡德距离。 文中从集合间杰卡德距离入手,首先通过设计一种新的编码方法,对参与计算的数据进行位置数字编码,将相似性度量问题转化为求两集合间相同数字个数问题,进而结合异或思想,借助同态加密体制具体设计了可以保护隐私的集合杰卡德距离协同计算协议,从而解决了集合间相似性度量的隐私保护问题。 模拟器证明该协议是安全的,结果分析表明协议可以高效安全地判定出两对象间集合数据的相似性,在保护隐私的集合相似性度量方面,该方法具备一定的普适性。
Abstract:
Set similarity measurement is one of the basic problems in the field of machine learning. Studying how to calculate thesimilarity between two sets on the premise of protecting data privacy has important theoretical significance and application value inmachine learning,graphics recognition,bioinformatics and so on. When estimating the similarity between different sample sets in machine learning,the similarity degree between samples is usually estimated by calculating the set similarity. This kind of similarity between sets is collectively referred to as set distance. Among them,the most commonly used set distance is Jaccard distance. Starting with the Jaccard distance between sets,we firstly design a new coding method to encode the position numbers of the data involved in the calculation, transform the similarity measurement problem into the problem of finding the number of the same numbers between two sets,and then design a set Jaccard distance collaborative calculation protocol that can protect privacy with the help of homomorphic encryption system, Thus,the privacy protection problem of similarity measurement between sets is solved. The simulator proves that the protocol is secure. The result analysis shows that the protocol can effectively and safely determine the similarity of set data between two objects. This method has certain universality in the measurement of set similarity to protect privacy.

相似文献/References:

[1]石磊 罗永龙 张彩云.随机化算法及其在最小外接圆求解中的应用[J].计算机技术与发展,2009,(08):82.
 SHI Lei,LUO Yong-long,ZHANG Cai-yun.Randomized Algorithm and Its Application in Finding Minimum Circumscribed Circle[J].,2009,(01):82.
[2]耿波 仲红 徐杰 闫娜娜.隐私保护的关联规则挖掘研究[J].计算机技术与发展,2009,(02):81.
 GENG Bo,ZHONG Hong,XU Jie,et al.Study on Privacy- Preserving Association Rule Mining[J].,2009,(01):81.
[3]张瑞 郑诚 陈娟娟.关联规则挖掘中的隐私保护研究[J].计算机技术与发展,2008,(10):13.
 ZHANG Rui,ZHENG Cheng,CFIEN Juan-juan.Research on Privacy Preserving in Association Rules Mining[J].,2008,(01):13.
[4]赵晓孔 罗永龙 程超 周正珍.一种基于反馈的信任生成算法[J].计算机技术与发展,2010,(12):166.
 ZHAO Xiao-kong,LUO Yong-long,CHENG Chao,et al.A Trust Generating Algorithm Based on Feedback[J].,2010,(01):166.
[5]李玲娟 郑少飞.基于数据处理的数据挖掘隐私保护技术分析[J].计算机技术与发展,2011,(03):94.
 LI Ling-juan,ZHENG Shao-fei.Analysis of Data Mining Privacy Preserving Technology Based on Data Processing[J].,2011,(01):94.
[6]赵玉 易磊.空间几何对象相对位置的新安全判定方法[J].计算机技术与发展,2011,(05):103.
 ZHAO Yu,YI Lei.A New Secure Method for Determining Two Spatial Geometric Objects Related Position[J].,2011,(01):103.
[7]杜定宇 王茜.一种基于中间代理的个性化推荐系统[J].计算机技术与发展,2011,(09):66.
 DU Ding-yu,WANG Qian.An Agent-Based Personalized Recommendation System[J].,2011,(01):66.
[8]杨宸 薛丹 周健.带空间特性的访问控制在汽车终端上的应用[J].计算机技术与发展,2012,(01):225.
 YANG Chen,XUE Dan,ZHOU Jian.Application of Role-Based Access Control with Spatial Character in Automobile Terminal[J].,2012,(01):225.
[9]韦琳 许峰.医疗网格隐私保护技术研究[J].计算机技术与发展,2012,(05):254.
 WEI Lin,XU Feng.Privacy Preservation in Heaithgrid:A Survey[J].,2012,(01):254.
[10]赵丹 杨庚.一种基于复数域的数据融合完整性保护算法[J].计算机技术与发展,2012,(08):150.
 ZHAO Dan,YANG Geng.A Complex Field-based Integrity-protecting Data Aggregation Algorithm[J].,2012,(01):150.

更新日期/Last Update: 2023-01-10