WEKO3
アイテム
{"_buckets": {"deposit": "c95f3feb-8061-4eba-bf1f-6b4fca57d247"}, "_deposit": {"created_by": 18, "id": "9984", "owners": [18], "pid": {"revision_id": 0, "type": "depid", "value": "9984"}, "status": "published"}, "_oai": {"id": "oai:muroran-it.repo.nii.ac.jp:00009984", "sets": ["46", "352"]}, "author_link": ["56260", "39157", "56259", "56261"], "item_79_biblio_info_10": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2015-12-23", "bibliographicIssueDateType": "Issued"}, "bibliographicIssueNumber": "3", "bibliographicPageEnd": "878", "bibliographicPageStart": "868", "bibliographicVolumeNumber": "6", "bibliographic_titles": [{"bibliographic_title": "IEEE Trannsactions on Cloud Computing", "bibliographic_titleLang": "en"}]}]}, "item_79_description_23": {"attribute_name": "フォーマット", "attribute_value_mlt": [{"subitem_description": "application/pdf", "subitem_description_type": "Other"}]}, "item_79_description_7": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "As the rapidly growing volume of data are beyond the capabilities of many computing infrastructures, to securely process them on cloud has become a preferred solution which can both utilize the powerful capabilities provided by cloud and protect data privacy. This paper puts forward a new approach to securely decompose tensor, the mathematical model widely used in data-intensive applications, to a core tensor and some truncated orthogonal bases. The structured, semi-structured as well as unstructured data are all transformed to low-order sub-tensors which are then encrypted using the fully homomorphic encryption scheme. A unified high-order cipher tensor model is constructed by collecting all the cipher sub-tensors and embedding them to a base tensor space. The cipher tensor is decomposed through a proposed secure algorithm, in which the square root operations are eliminated during the Lanczos procedure. The paper makes an analysis of the secure algorithm in terms of time consumption, memory usage and decomposition accuracy. Experimental results reveals that this approach can securely decompose tensor models. With the advancement of fully homomorphic encryption scheme, the proposed secure tensor decomposition method is expected to be widely applied on cloud for privacy-preserving data processing.", "subitem_description_language": "en", "subitem_description_type": "Abstract"}]}, "item_79_link_17": {"attribute_name": "出版者版へのリンク", "attribute_value_mlt": [{"subitem_link_text": "10.1109/TCC.2015.2511769", "subitem_link_url": "https://doi.org/10.1109/TCC.2015.2511769"}]}, "item_79_link_5": {"attribute_name": "室蘭工業大学研究者データベースへのリンク", "attribute_value_mlt": [{"subitem_link_text": "董 冕雄(DONG Mianxiong)", "subitem_link_url": "http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html"}]}, "item_79_publisher_11": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "IEEE", "subitem_publisher_language": "en"}]}, "item_79_relation_18": {"attribute_name": "DOI", "attribute_value_mlt": [{"subitem_relation_type": "isVersionOf", "subitem_relation_type_id": {"subitem_relation_type_id_text": "10.1109/TCC.2015.2511769", "subitem_relation_type_select": "DOI"}}]}, "item_79_rights_19": {"attribute_name": "権利", "attribute_value_mlt": [{"subitem_rights": "© 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.", "subitem_rights_language": "en"}]}, "item_79_source_id_12": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "2168-7161", "subitem_source_identifier_type": "PISSN"}]}, "item_79_subject_9": {"attribute_name": "日本十進分類法", "attribute_value_mlt": [{"subitem_subject": "007", "subitem_subject_scheme": "NDC"}]}, "item_79_text_4": {"attribute_name": "著者ID(非表示)", "attribute_value_mlt": [{"subitem_text_value": "1000020728274"}]}, "item_79_version_type_21": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_ab4af688f83e57aa", "subitem_version_type": "AM"}]}, "item_access_right": {"attribute_name": "アクセス権", "attribute_value_mlt": [{"subitem_access_right": "open access", "subitem_access_right_uri": "http://purl.org/coar/access_right/c_abf2"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorAffiliations": [{"affiliationNameIdentifiers": [], "affiliationNames": [{"affiliationName": "", "affiliationNameLang": "ja"}]}], "creatorNames": [{"creatorName": "KUANG, Liwei", "creatorNameLang": "en"}], "familyNames": [{"familyName": "KUANG", "familyNameLang": "en"}], "givenNames": [{"givenName": "Liwei", "givenNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "56259", "nameIdentifierScheme": "WEKO"}]}, {"creatorNames": [{"creatorName": "YANG, Lawrence T.", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "56260", "nameIdentifierScheme": "WEKO"}]}, {"creatorAffiliations": [{"affiliationNameIdentifiers": [], "affiliationNames": [{"affiliationName": "", "affiliationNameLang": "ja"}]}], "creatorNames": [{"creatorName": "FENG, Jun", "creatorNameLang": "en"}], "familyNames": [{"familyName": "FENG", "familyNameLang": "en"}], "givenNames": [{"givenName": "Jun", "givenNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "56261", "nameIdentifierScheme": "WEKO"}]}, {"creatorAffiliations": [{"affiliationNameIdentifiers": [{"affiliationNameIdentifier": "10103", "affiliationNameIdentifierScheme": "kakenhi"}], "affiliationNames": [{"affiliationName": "室蘭工業大学", "affiliationNameLang": "ja"}, {"affiliationName": "Muroran Institute of Technology", "affiliationNameLang": "en"}]}], "creatorNames": [{"creatorName": "DONG, Mianxiong", "creatorNameLang": "en"}, {"creatorName": "トウ, メンユウ", "creatorNameLang": "ja-Kana"}, {"creatorName": "董, 冕雄", "creatorNameLang": "ja"}], "familyNames": [{"familyName": "DONG", "familyNameLang": "en"}, {"familyName": "トウ", "familyNameLang": "ja-Kana"}, {"familyName": "董", "familyNameLang": "ja"}], "givenNames": [{"givenName": " Mianxiong", "givenNameLang": "en"}, {"givenName": "メンユウ", "givenNameLang": "ja-Kana"}, {"givenName": "冕雄", "givenNameLang": "ja"}], "nameIdentifiers": [{"nameIdentifier": "39157", "nameIdentifierScheme": "WEKO"}, {"nameIdentifier": "1000020728274", "nameIdentifierScheme": "NRID", "nameIdentifierURI": "https://nrid.nii.ac.jp/ja/nrid/1000020728274"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2019-06-27"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "IEEETCC_6_3_868_878.pdf", "filesize": [{"value": "1.8 MB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_note", "mimetype": "application/pdf", "size": 1800000.0, "url": {"label": "IEEETCC_6_3_868_878", "objectType": "fulltext", "url": "https://muroran-it.repo.nii.ac.jp/record/9984/files/IEEETCC_6_3_868_878.pdf"}, "version_id": "573008ed-ee05-4fed-a396-b2cd630331ca"}]}, "item_keyword": {"attribute_name": "キーワード", "attribute_value_mlt": [{"subitem_subject": "Tensor decomposition", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "fully homomorphic encryption", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Lanczos method", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "cloud", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme", "subitem_title_language": "en"}]}, "item_type_id": "79", "owner": "18", "path": ["46", "352"], "permalink_uri": "http://hdl.handle.net/10258/00009932", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2019-06-27"}, "publish_date": "2019-06-27", "publish_status": "0", "recid": "9984", "relation": {}, "relation_version_is_last": true, "title": ["Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme"], "weko_shared_id": -1}
Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme
http://hdl.handle.net/10258/00009932
http://hdl.handle.net/10258/000099329ed4ee44-006a-4291-877c-244d0f5f4554
名前 / ファイル | ライセンス | アクション |
---|---|---|
IEEETCC_6_3_868_878 (1.8 MB)
|
|
Item type | 学術雑誌論文 / Journal Article.(1) | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
公開日 | 2019-06-27 | |||||||||||
タイトル | ||||||||||||
言語 | en | |||||||||||
タイトル | Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme | |||||||||||
言語 | ||||||||||||
言語 | eng | |||||||||||
キーワード | ||||||||||||
言語 | en | |||||||||||
主題Scheme | Other | |||||||||||
主題 | Tensor decomposition | |||||||||||
キーワード | ||||||||||||
言語 | en | |||||||||||
主題Scheme | Other | |||||||||||
主題 | fully homomorphic encryption | |||||||||||
キーワード | ||||||||||||
言語 | en | |||||||||||
主題Scheme | Other | |||||||||||
主題 | Lanczos method | |||||||||||
キーワード | ||||||||||||
言語 | en | |||||||||||
主題Scheme | Other | |||||||||||
主題 | cloud | |||||||||||
資源タイプ | ||||||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||||||
資源タイプ | journal article | |||||||||||
アクセス権 | ||||||||||||
アクセス権 | open access | |||||||||||
アクセス権URI | http://purl.org/coar/access_right/c_abf2 | |||||||||||
著者 |
KUANG, Liwei
× KUANG, Liwei× YANG, Lawrence T.× FENG, Jun× 董, 冕雄
WEKO
39157
|
|||||||||||
室蘭工業大学研究者データベースへのリンク | ||||||||||||
董 冕雄(DONG Mianxiong) | ||||||||||||
http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html | ||||||||||||
抄録 | ||||||||||||
内容記述タイプ | Abstract | |||||||||||
内容記述 | As the rapidly growing volume of data are beyond the capabilities of many computing infrastructures, to securely process them on cloud has become a preferred solution which can both utilize the powerful capabilities provided by cloud and protect data privacy. This paper puts forward a new approach to securely decompose tensor, the mathematical model widely used in data-intensive applications, to a core tensor and some truncated orthogonal bases. The structured, semi-structured as well as unstructured data are all transformed to low-order sub-tensors which are then encrypted using the fully homomorphic encryption scheme. A unified high-order cipher tensor model is constructed by collecting all the cipher sub-tensors and embedding them to a base tensor space. The cipher tensor is decomposed through a proposed secure algorithm, in which the square root operations are eliminated during the Lanczos procedure. The paper makes an analysis of the secure algorithm in terms of time consumption, memory usage and decomposition accuracy. Experimental results reveals that this approach can securely decompose tensor models. With the advancement of fully homomorphic encryption scheme, the proposed secure tensor decomposition method is expected to be widely applied on cloud for privacy-preserving data processing. | |||||||||||
言語 | en | |||||||||||
書誌情報 |
en : IEEE Trannsactions on Cloud Computing 巻 6, 号 3, p. 868-878, 発行日 2015-12-23 |
|||||||||||
出版者 | ||||||||||||
言語 | en | |||||||||||
出版者 | IEEE | |||||||||||
出版者版へのリンク | ||||||||||||
10.1109/TCC.2015.2511769 | ||||||||||||
https://doi.org/10.1109/TCC.2015.2511769 | ||||||||||||
DOI | ||||||||||||
関連タイプ | isVersionOf | |||||||||||
識別子タイプ | DOI | |||||||||||
関連識別子 | 10.1109/TCC.2015.2511769 | |||||||||||
日本十進分類法 | ||||||||||||
主題Scheme | NDC | |||||||||||
主題 | 007 | |||||||||||
ISSN | ||||||||||||
収録物識別子タイプ | PISSN | |||||||||||
収録物識別子 | 2168-7161 | |||||||||||
権利 | ||||||||||||
言語 | en | |||||||||||
権利情報 | © 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | |||||||||||
著者版フラグ | ||||||||||||
出版タイプ | AM | |||||||||||
出版タイプResource | http://purl.org/coar/version/c_ab4af688f83e57aa | |||||||||||
フォーマット | ||||||||||||
内容記述タイプ | Other | |||||||||||
内容記述 | application/pdf |