2018
DOI: 10.2991/ijcis.11.1.3
|View full text |Cite
|
Sign up to set email alerts
|

CPP-ELM: Cryptographically Privacy-Preserving Extreme Learning Machine for Cloud Systems

Abstract: The training techniques of the distributed machine learning approach replace the traditional methods with a cloud computing infrastructure and provide flexible computing services to clients. Moreover, machine learning-based classification methods are used in many diverse applications such as medical predictions, speech/face recognition, and financial applications. Most of the application areas require security and confidentiality for both the data and the classifier model. In order to prevent the risk of confi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(13 citation statements)
references
References 27 publications
0
13
0
Order By: Relevance
“…To protect user attribute privacy, a sequence of privacy protection schemes have been presented [16,17]. Generally, policy hiding consists of two types: partial hiding and full hiding.…”
Section: Related Workmentioning
confidence: 99%
“…To protect user attribute privacy, a sequence of privacy protection schemes have been presented [16,17]. Generally, policy hiding consists of two types: partial hiding and full hiding.…”
Section: Related Workmentioning
confidence: 99%
“…In our previous work, [7], we applied partially homomorphic encryption methods to build a probabilistic classifier using the extreme learning machine algorithm. Within the scope of this previous study, we have examined how to create classification models using homomorphic encryption algorithms.…”
Section: Contributionmentioning
confidence: 99%
“…However, most of the transmission processes for these contents have been done through an unsecure network, which means there is potential risk for the loss of information or the interception (i.e., illegal copying and distribution) or even malicious tampering of this information [1,2]. Therefore, the security of multimedia information, especially in the field of big data and cloud systems, has raised increasing concern [3,4]. Traditional encryption methods include the implementation of the data encryption standard (DES) and advance encryption standard (AES) algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…Calculate the initial conditions µ, λ, x 0 , and y 0 in accordance with the h 1 , h 2 , h 3 , h 4 , and the equations applied are displayed in (3).…”
mentioning
confidence: 99%