Your browser doesn't support javascript.
Show: 20 | 50 | 100
Results 1 - 4 de 4
Filter
1.
Journal of Information Security and Applications ; 74, 2023.
Article in English | Scopus | ID: covidwho-2268864

ABSTRACT

As the world grapples with the COVID-19 and its variants, multi-user collaboration by means of cloud computing is ubiquitous. How to make better use of cloud resources while preventing user privacy leakage has become particularly important. Multi-key homomorphic encryption(MKHE) can effectively deal with the privacy disclosure issue during the multi-user collaboration in the cloud computing setting. Firstly, we improve the DGHV homomorphic scheme by modifying the selection of key and the coefficients in encryption, so as to eliminate the restriction on the parity of the ciphertext modulus in the public key. On this basis, we further propose a DGHV-type MKHE scheme based on the number theory. In our scheme, an extended key is introduced for ciphertext extension, and we prove that it is efficient in performance analysis. The semantic security of our schemes is proved under the assumption of error-free approximate greatest common divisor and the difficulty of large integer factorization. Furthermore, the simulation experiments show the availability and computational efficiency of our MKHE scheme. Therefore, our scheme is suitable for the multi-user scenario in cloud environment. © 2023 Elsevier Ltd

2.
4th International Conference on Machine Learning for Cyber Security, ML4CS 2022 ; 13656 LNCS:15-30, 2023.
Article in English | Scopus | ID: covidwho-2288671

ABSTRACT

Data is an important production factor in the era of digital economy. Privacy computing can ensure that data providers do not disclose sensitive data, carry out multi-party joint analysis and computation, securely and privately complete the full excavation of data value in the process of circulation, sharing, fusion, and calculation, which has become a popular research topic. String comparison is one of the common operations in data processing. To address the string comparison problem in multi-party scenarios, we propose an algorithm for secure string comparison based on outsourced computation. The algorithm encodes the strings with one hot encoding scheme and encrypts the encoded strings using an XOR homomorphic encryption scheme. The proposed algorithm achieves efficient and secure string comparison and counts the number of different characters with the help of a cloud-assisted server. The proposed scheme is implemented and verified using the new coronavirus gene sequence as the comparison string, and the performance is compared with that of a state-of-the-art security framework. Experiments show that the proposed algorithm can effectively improve the string comparison speed and obtain correct comparison results without compromising data privacy. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.

3.
4th International Conference on Data Intelligence and Security, ICDIS 2022 ; : 148-154, 2022.
Article in English | Scopus | ID: covidwho-2213248

ABSTRACT

Constructing a phylogenetic tree is an essential method of analyzing the evolution of the covid-19 virus. In the case of multiple entities holding different coronavirus genetic data, it is simple to aggregate all data into one entity and then calculate the phylogenetic tree. However, such a method is challenging to carry out. Genetic data is susceptible and has high economic value, and it is usually impossible to copy between different entities directly. Also, the direct sharing of genetic data can lead to data leaks or even legal problems. In this paper, we propose a homomorphic-encryption-based solution to tackle this problem, where two participants, A and B, both hold a part of covid-19 genetic data and compute the gene distance matrix calculation of the overall dataset without revealing the genetic data held by both parties. After the computation, participant A can decrypt the final distance matrix from the encrypted result and then use the plain-text result to construct the covid-19 phylogenetic tree. Experiment results show that the proposed method can process the genetic data accurately in a short time, and the phylogenetic tree generated by the proposed solution has no loss of accuracy compared to plain-text calculation. In terms of engineering optimization, we propose an optimized encryption method, which can further shorten the encryption time of the entire dataset without reducing the security level. © 2022 IEEE.

4.
2nd International Conference of Smart Systems and Emerging Technologies, SMARTTECH 2022 ; : 220-225, 2022.
Article in English | Scopus | ID: covidwho-2018986

ABSTRACT

Deep learning (DL) is being increasingly utilized in healthcare-related fields due to its outstanding efficiency. However, we have to keep the individual health data used by DL models private and secure. Protecting data and preserving the privacy of individuals has become an increasingly prevalent issue. The gap between the DL and privacy communities must be bridged. In this paper, we propose privacy-preserving deep learning (PPDL)-based approach to secure the classification of Chest X-ray images. This study aims to use Chest X-ray images to their fullest potential without compromising the privacy of the data that it contains. The proposed approach is based on two steps: encrypting the dataset using partially homomorphic encryption and training/testing the DL algorithm over the encrypted images. Experimental results on the COVID-19 Radiography database show that the MobileNetV2 model achieves an accuracy of 94.2% over the plain data and 93.3% over the encrypted data. © 2022 IEEE.

SELECTION OF CITATIONS
SEARCH DETAIL