{"created":"2023-06-19T10:29:54.485300+00:00","id":9984,"links":{},"metadata":{"_buckets":{"deposit":"c95f3feb-8061-4eba-bf1f-6b4fca57d247"},"_deposit":{"created_by":18,"id":"9984","owners":[18],"pid":{"revision_id":0,"type":"depid","value":"9984"},"status":"published"},"_oai":{"id":"oai:muroran-it.repo.nii.ac.jp:00009984","sets":["216:352","46"]},"author_link":["56260","39157","56259","56261"],"item_79_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2015-12-23","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicPageEnd":"878","bibliographicPageStart":"868","bibliographicVolumeNumber":"6","bibliographic_titles":[{"bibliographic_title":"IEEE Trannsactions on Cloud Computing","bibliographic_titleLang":"en"}]}]},"item_79_description_23":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_79_description_7":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"As the rapidly growing volume of data are beyond the capabilities of many computing infrastructures, to securely process them on cloud has become a preferred solution which can both utilize the powerful capabilities provided by cloud and protect data privacy. This paper puts forward a new approach to securely decompose tensor, the mathematical model widely used in data-intensive applications, to a core tensor and some truncated orthogonal bases. The structured, semi-structured as well as unstructured data are all transformed to low-order sub-tensors which are then encrypted using the fully homomorphic encryption scheme. A unified high-order cipher tensor model is constructed by collecting all the cipher sub-tensors and embedding them to a base tensor space. The cipher tensor is decomposed through a proposed secure algorithm, in which the square root operations are eliminated during the Lanczos procedure. The paper makes an analysis of the secure algorithm in terms of time consumption, memory usage and decomposition accuracy. Experimental results reveals that this approach can securely decompose tensor models. With the advancement of fully homomorphic encryption scheme, the proposed secure tensor decomposition method is expected to be widely applied on cloud for privacy-preserving data processing.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_79_link_17":{"attribute_name":"出版者版へのリンク","attribute_value_mlt":[{"subitem_link_text":"10.1109/TCC.2015.2511769","subitem_link_url":"https://doi.org/10.1109/TCC.2015.2511769"}]},"item_79_link_5":{"attribute_name":"室蘭工業大学研究者データベースへのリンク","attribute_value_mlt":[{"subitem_link_text":"董 冕雄(DONG Mianxiong)","subitem_link_url":"http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html"}]},"item_79_publisher_11":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"IEEE","subitem_publisher_language":"en"}]},"item_79_relation_18":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isVersionOf","subitem_relation_type_id":{"subitem_relation_type_id_text":"10.1109/TCC.2015.2511769","subitem_relation_type_select":"DOI"}}]},"item_79_rights_19":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"© 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.","subitem_rights_language":"en"}]},"item_79_source_id_12":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2168-7161","subitem_source_identifier_type":"PISSN"}]},"item_79_subject_9":{"attribute_name":"日本十進分類法","attribute_value_mlt":[{"subitem_subject":"007","subitem_subject_scheme":"NDC"}]},"item_79_version_type_21":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_ab4af688f83e57aa","subitem_version_type":"AM"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"open access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_abf2"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorAffiliations":[{"affiliationNameIdentifiers":[],"affiliationNames":[{"affiliationName":""}]}],"creatorNames":[{"creatorName":"KUANG, Liwei","creatorNameLang":"en"}],"familyNames":[{}],"givenNames":[{}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"YANG, Lawrence T.","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[],"affiliationNames":[{"affiliationName":""}]}],"creatorNames":[{"creatorName":"FENG, Jun","creatorNameLang":"en"}],"familyNames":[{}],"givenNames":[{}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{}],"affiliationNames":[{},{}]}],"creatorNames":[{"creatorName":"DONG, Mianxiong","creatorNameLang":"en"},{"creatorName":"トウ, メンユウ","creatorNameLang":"ja-Kana"},{"creatorName":"董, 冕雄","creatorNameLang":"ja"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2019-06-27"}],"displaytype":"detail","filename":"IEEETCC_6_3_868_878.pdf","filesize":[{"value":"1.8 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"IEEETCC_6_3_868_878","objectType":"fulltext","url":"https://muroran-it.repo.nii.ac.jp/record/9984/files/IEEETCC_6_3_868_878.pdf"},"version_id":"573008ed-ee05-4fed-a396-b2cd630331ca"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Tensor decomposition","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"fully homomorphic encryption","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Lanczos method","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"cloud","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme","subitem_title_language":"en"}]},"item_type_id":"79","owner":"18","path":["46","352"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2019-06-27"},"publish_date":"2019-06-27","publish_status":"0","recid":"9984","relation_version_is_last":true,"title":["Secure Tensor Decomposition Using Fully Homomorphic Encryption Scheme"],"weko_creator_id":"18","weko_shared_id":-1},"updated":"2024-02-05T03:15:04.156266+00:00"}