English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文笔数/总笔数 : 118786/149850 (79%)
造访人次 : 81698248      在线人数 : 3322
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻


    请使用永久网址来引用或连结此文件: https://nccur.lib.nccu.edu.tw/handle/140.119/159701


    题名: 基於多雲架構之多方數據主成份分析隱私保護技術
    Privacy Protection Technology for Principal Component Analysis of Multi-Party Data Based on Multi-Cloud Architecture
    作者: 陳幼恩
    Chen, Yu-En
    贡献者: 左瑞麟
    Tso, Ray-Lin
    陳幼恩
    Chen, Yu-En
    关键词: 隱私保護
    秘密共享
    主成分分析
    多方計算
    Privacy-preserving
    Secret Sharing
    Principal component analysis
    Multi party Computation
    日期: 2025
    上传时间: 2025-10-02 11:11:19 (UTC+8)
    摘要: 隨著隱私保護需求在資料分析與機器學習領域的重要性日益提升,多方資料環境下的安全協同計算已成為關鍵課題。為此,本研究提出一項基於多雲架構之多方數據主成分分析(PCA)隱私保護技術,能於無需集中明文資料的情況下,完成分散式的特徵萃取任務。本技術整合門限式秘密共享、混淆機制與協同計算協議,有效避免任何單一雲端節點接觸原始資料或中間統計資訊。本方法以保護協方差矩陣為核心,結合多方資料提供者與多雲節點,實現可擴展且具安全保證的主成分特徵計算流程。各方僅需共享經過秘密分割的統計量,即可在不暴露任何原始內容的前提下,完成特徵值與特徵向量之協同運算。最終所輸出的主成分資訊可供資料消費者用於後續模型訓練與分析任務,兼顧隱私保護與實用性。本技術設計強調對多方數據場景的適應性,並在安全性、通訊與計算開銷之間取得良好平衡,具備高度擴展潛力,適用於醫療、金融與工業等需嚴格隱私保護之跨域應用場景。
    As the demand for privacy protection in data analytics and machine-learning continues to grow, secure collaborative computation over multi-party data has become a critical research topic. To address this challenge, we propose a privacy-preserving principal component analysis (PCA) technique based on a multi-cloud architecture, which performs distributed feature extraction without aggregating plaintext data. The proposed technique combines threshold secret sharing, obfuscation mechanisms, and collaborative-computing protocols, thereby preventing any single cloud node from accessing raw data or intermediate statistical information. Focusing on the protection of the covariance matrix, the method links multiple data providers with multiple cloud nodes to create a scalable, provably secure workflow for computing principal components. Each party shares only secret-split statis tics, enabling the joint calculation of eigenvalues and eigenvectors without revealing any original content. The resulting principal-component information can be delivered to data consumers for downstream model training and analysis, ensuring both privacy and usability. Designed for multi-party data scenarios, the architecture strikes an effective balance among security, communication, and computational overhead. It offers strong scalability and is well-suited to cross-domain applications—such as healthcare, finance, and industrial settings—where stringent privacy protection is essential.
    參考文獻: [1] Daniel E. O’Leary. “Artificial Intelligence and Big Data.” In: IEEE Intelligent Sys- tems 28.2 (2013), pp. 96–99 (cit. p. 1).
    [2] Keith Bonawitz, Vladimir Ivanov, Ben Kreuter, et al. “Practical Secure Aggrega- tion for Privacy-Preserving Machine Learning.” In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. CCS ’17. Dallas, Texas, USA: Association for Computing Machinery, 2017, pp. 1175–1191 (cit. p. 1).
    [3] Hoon Wei Lim, Geong Sen Poh, Jia Xu, and Varsha Chittawar. “PrivateLink : Privacy- Preserving Integration and Sharing of Datasets.” In: IEEE Transactions on Informa- tion Forensics and Security 15 (2020), pp. 564–577 (cit. p. 1).
    [4] Arvind Narayanan and Vitaly Shmatikov. “Robust De-anonymization of Large Sparse Datasets.” In: 2008 IEEE Symposium on Security and Privacy (sp 2008). 2008, pp. 111– 125 (cit. p. 1).
    [5] Wayne Jansen and Timothy Grance. SP 800-144. Guidelines on Security and Privacy in Public Cloud Computing. Tech. rep. Gaithersburg, MD, USA: National Institute of Standards and Technology (NIST), 2011 (cit. p. 1).
    [6] Johannes Heurix, Peter Zimmermann, Thomas Neubauer, and Stefan Fenz. “A tax- onomy for privacy enhancing technologies.” In: Computers & Security 53 (2015),
    pp. 1–17 (cit. p. 1).
    [7] Inayat Ali, Eraj Khan, and Sonia Sabir. “Privacy-preserving data aggregation in resource- constrained sensor nodes in Internet of Things: A review.” In: Future Computing and Informatics Journal 3.1 (2018), pp. 41–50 (cit. p. 1).
    [8] Adi Shamir. “How to share a secret.” In: Commun. ACM 22.11 (Nov. 1979), pp. 612– 613 (cit. p. 1).
    [9] Nileshkumar Kakade and Utpalkumar Patel. “Secure Secret Sharing Using Homo- morphic Encryption.” In: 2020 11th International Conference on Computing, Com- munication and Networking Technologies (ICCCNT). 2020, pp. 1–7 (cit. p. 2).
    [10] Saloni Kwatra and Vicenç Torra. “Data reconstruction attack against principal com- ponent analysis.” In: International Symposium on Security and Privacy in Social Net- works and Big Data. Springer. 2023, pp. 79–92 (cit. p. 2).
    [11] Valeria Nikolaenko, Stratis Ioannidis, Udi Weinsberg, et al. “Privacy-preserving ma- trix factorization.” In: Proceedings of the 2013 ACM SIGSAC Conference on Com- puter & Communications Security. CCS ’13. Berlin, Germany: Association for Com- puting Machinery, 2013, pp. 801–812 (cit. p. 2).
    [12] Samanvaya Panda. “Principal component analysis using CKKS homomorphic scheme.” In: Cyber Security Cryptography and Machine Learning: 5th International Sympo- sium, CSCML 2021, Be’er Sheva, Israel, July 8–9, 2021, Proceedings 5. Springer. 2021, pp. 52–70 (cit. pp. 3, 7).
    [13] Xiaoyu Fan, Guosai Wang, Kun Chen, Xu He, and Wei Xu. “Ppca: Privacy-preserving principal component analysis using secure multiparty computation (mpc).” In: arXiv preprint arXiv:2105.07612 (2021) (cit. pp. 3, 8, 56–59).
    [14] Ian T Jolliffe. Principal component analysis for special types of data. Springer, 2002 (cit. p. 7).
    [15] Xinbo Liu, Yaping Lin, Qin Liu, and Xin Yao. “A privacy-preserving principal com- ponent analysis outsourcing framework.” In: 2018 17th IEEE International Confer- ence On Trust, Security And Privacy In Computing And Communications/12th IEEE
    International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE. 2018, pp. 1354–1359 (cit. p. 7).
    [16] Xirong Ma, Chuan Ma, Yali Jiang, and Chunpeng Ge. “Improved privacy-preserving PCA using optimized homomorphic matrix multiplication.” In: Computers & Secu- rity 138 (2024), p. 103658 (cit. p. 8).
    [17] Zhihua Xia, Qi Gu, Lizhi Xiong, and Wenhao Zhou. “Privacy-preserving image re- trieval based on additive secret sharing.” In: International Journal of Autonomous and Adaptive Communications Systems 17.2 (2024), pp. 99–126 (cit. p. 8).
    [18] Yingting Liu, Chaochao Chen, Longfei Zheng, et al. “Privacy preserving pca for multiparty modeling.” In: arXiv preprint arXiv:2002.02091 (2020) (cit. p. 8).
    [19] Hsin-Chan Yen. “Privacy Preserving Principal Components Analysis: A Dual-Cloud Construction Based on Secret Sharing for Protecting Covariance Matrix.” Available from the National Digital Library of Theses and Dissertations in Taiwan. Master’s Thesis. National Taiwan University of Science and Technology, 2024 (cit. pp. 3, 8, 60).
    [20] Donald Beaver. “Efficient multiparty protocols using circuit randomization.” In: Ad- vances in Cryptology—CRYPTO’91: Proceedings 11. Springer. 1992, pp. 420–432
    (cit. p. 11).
    [21] Michel Journée, Yurii Nesterov, Peter Richtárik, and Rodolphe Sepulchre. “General- ized power method for sparse principal component analysis.” In: Journal of Machine Learning Research 11 (2010) (cit. p. 20).
    [22] Roger A Horn and Charles R Johnson. Matrix analysis. Cambridge university press, 2012 (cit. p. 17).
    [23] Josef Stoer, Roland Bulirsch, R Bartels, Walter Gautschi, and Christoph Witzgall. Introduction to numerical analysis. Vol. 1993. Springer, 1980 (cit. p. 18).
    [24] RP Kanwal and KC Liu. “A Taylor expansion approach for solving integral equa- tions.” In: International Journal of Mathematical Education in Science and Technol- ogy 20.3 (1989), pp. 411–414 (cit. p. 18).
    [25] Louis W Ehrlich. “A modified Newton method for polynomials.” In: Communica- tions of the ACM (1967), pp. 107–108 (cit. p. 19).
    [26] Ian T Jolliffe. Principal component analysis for special types of data. Springer, 2002.
    [27] Payman Mohassel and Yupeng Zhang. “Secureml: A system for scalable privacy- preserving machine learning.” In: 2017 IEEE symposium on security and privacy (SP). IEEE. 2017, pp. 19–38.
    [28] R. Canetti. “Universally composable security: a new paradigm for cryptographic pro- tocols.” In: Proceedings 42nd IEEE Symposium on Foundations of Computer Sci-ence.
    2001, pp. 136–145 (cit. p. 43).
    [29] Paulo Cortez, António Cerdeira, Fernando Almeida, Telmo Matos, and José Reis. “Modeling wine preferences by data mining from physicochemical properties.” In: Decision Support Systems 47.4 (2009), pp. 547–553 (cit. p. 55).
    [30] Lingjun Meng, Peter van der Putten, and Haiyang Wang. “A comprehensive bench- mark of the artificial immune recognition system (AIRS).” In: International Con- ference on Advanced Data Mining and Applications. Springer, 2005, pp. 66–76 (cit. p. 55).
    [31] Fabian Pedregosa, Gaël Varoquaux, Alexandre Gramfort, et al. “Scikit-learn: Ma- chine learning in
    Python.” In: the Journal of machine Learning research 12 (2011), pp. 2825–2830 (cit. p. 55).
    描述: 碩士
    國立政治大學
    資訊安全碩士學位學程
    112791005
    資料來源: http://thesis.lib.nccu.edu.tw/record/#G0112791005
    数据类型: thesis
    显示于类别:[資訊安全碩士學位學程] 學位論文

    文件中的档案:

    档案 大小格式浏览次数
    100501.pdf1928KbAdobe PDF0检视/开启


    在政大典藏中所有的数据项都受到原著作权保护.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈