西安电子科技大学学报 ›› 2024, Vol. 51 ›› Issue (2): 196-210.doi: 10.19665/j.issn1001-2400.20230305

• 计算机科学与技术&网络空间安全 • 上一篇    下一篇

抗理性敌手共谋的安全K-prototype聚类

田有亮1,2,3,4(), 赵敏1,2,3,4(), 毕仁万5(), 熊金波1,2,5()   

  1. 1.贵州大学 公共大数据国家重点实验室,贵州 贵阳 550025
    2.贵州大学 计算机科学与技术学院,贵州 贵阳 550025
    3.贵州大学 密码学与数据安全研究所,贵州 贵阳 550025
    4.贵州省密码学与区块链技术特色重点实验室,贵州 贵阳 550025
    5.福建师范大学 计算机与网络空间安全学院,福建 福州 350117
  • 收稿日期:2022-10-31 出版日期:2024-04-20 发布日期:2023-10-07
  • 通讯作者: 熊金波(1981—),男,教授,Email:jbxiong@fjnu.edu.cn
  • 作者简介:田有亮(1982—),男,教授,E-mail:youliangtian@163.com;
    赵 敏(1995—),女,贵州大学硕士研究生,E-mail:2233174061@qq.com;
    毕仁万(1996—),男,福建师范大学博士研究生,E-mail:brw2806@163.com
  • 基金资助:
    国家重点研发计划(2021YFB3101100);国家自然科学基金(62272123);国家自然科学基金(62272102);贵州省高层次创新型人才(黔科合平台人才[2020]6008);贵阳市科技计划(筑科合[2021]1-5);贵阳市科技计划(筑科合[2022]2-4);贵州省科技计划(黔科合平台人才[2020]5017);贵州省科技计划(黔科合支撑[2022]一般065)

Secure K-prototype clustering against the collusion of rational adversaries

TIAN Youliang1,2,3,4(), ZHAO Min1,2,3,4(), BI Renwan5(), XIONG Jinbo1,2,5()   

  1. 1. State Key Laboratory of Public Big Date,Guizhou University,Guiyang 550025,China
    2. College of Computer Science and Technology,Guizhou University,Guiyang 550025,China
    3. Institute of Cryptography & Data Security,Guizhou University,Guiyang 550025,China
    4. Guizhou Provincial Key Laboratory of Cryptography & Blockchain Technology,Guiyang 550025,China
    5. College of Computer and Cyber Security,Fujian Normal University,Fuzhou 350117,China
  • Received:2022-10-31 Online:2024-04-20 Published:2023-10-07

摘要:

针对云环境下数据隐私泄露及聚类过程中云服务器间共谋的问题,提出一种抗理性敌手共谋的安全协作K-prototype聚类方案,目的在不泄露各方隐私数据情况下根据距离度量将相似的数据进行聚类。首先,考虑到同态加密不直接支持非线性计算,基于同态加密和加性秘密共享技术设计安全比较协议和安全大于协议,并确保输入数据、中间结果及模型参数均为加性秘密份额形式,以防止单个服务器能够获得完整数据,且能实现非线性函数的精确计算,在已设计的安全计算协议基础上,实现安全距离计算、安全聚类标签更新、安全聚类中心更新、聚类标签及聚类中心重构;其次,根据博弈均衡理论设计多种高效激励机制,构造互制合约及举报合约以约束云服务器诚实非共谋地执行聚类任务;最后,对所提的安全计算协议及合约进行理论分析,并对该方案的性能进行实验验证。实验结果表明,与明文环境下的模型精度相比,该方案的模型精度损失控制在0.22%内,进而验证了所提方案的有效性。

关键词: 加性秘密共享, 同态加密, 安全计算协议, 抗共谋, 安全协作

Abstract:

Aiming at the problem of data privacy leakage in cloud environment and collusion between cloud servers in the process of clustering,an cooperative secure K-prototype clustering scheme(CSKC) against the adversaries of rational collusion is proposed.First,considering that homomorphic encryption does not directly support nonlinear computing,secure computing protocols are designed based on homomorphic encryption and additive secret sharing to ensure that the input data and intermediate results are in the form of additive secret share,and to achieve accurate calculation of the security comparison function.Second,according to the game equilibrium theory,a variety of efficient incentive mechanisms are designed,and the mutual condition contract and report contract are constructed to constrain cloud servers to implement secure computing protocols honestly and non-collusively.Finally,the proposed protocols and contracts are analyzed theoretically,and the performance of the CSKC scheme is verified by experiment.Experimental results show that compared with the model accuracy in plaintext environment,the model accuracy loss of the CSKC scheme is controlled within 0.22%.

Key words: additive secret sharing, homomorphic encryption, secure computing protocol, collusion-resistance, cooperative securely

中图分类号: 

  • TP309.7
Baidu
map