Computer Science ›› 2025, Vol. 52 ›› Issue (11): 415-424.doi: 10.11896/jsjkx.241100101

• Information Security • Previous Articles     Next Articles

Lightweight Privacy-preserving Mobile Sensing Classification Framework Based on AddictiveSecret Sharing

HE Yuyu1,2,3, ZHOU Feng1, TIAN Youliang3,4, XIONG Wei1, WANG Shuai1,2,3   

  1. 1 State Key Laboratory of Public Big Data,College of Computer Science and Technology,Guizhou University,Guiyang 550025,China
    2 Guizhou Provincial Key Laboratory of Cryptography and Blockchain Technology,Guiyang 550025,China
    3 Institute of Cryptography & Data Security,Guizhou University,Guiyang 550025,China
    4 College of Big Data and Information Engineering,Guizhou University,Guiyang 550025,China
  • Received:2024-11-18 Revised:2025-02-21 Online:2025-11-15 Published:2025-11-06
  • About author:HE Yuyu,born in 2000,postgraduate.His main research interests include privacy-preserving machine learning and secure multi-party computation.
    ZHOU Feng,born in1976,postgra-duate,associate professor,postgraduate supervisor.Her main research interests include big data security and privacy protection.
  • Supported by:
    National Key R&D Program of China(2021YFB3101100),National Natural Science Foundation of China(62272123),Project of High-level Innovative Talents of Guizhou Province([2020]6008),Science and Technology Program of Guizhou Province([2020]5017,[2022]065,[2022]ZD001) and Science and Technology Program of Guiyang([2022]2-4).

Abstract: To address data privacy leakage in deploying convolutional neural network models on mobile sensing devices,as well as the challenge of excessive communication overhead caused by server interaction computations in privacy-preserving target classification frameworks,a lightweight privacy-preserving mobile sensing object classification framework(LPMS) based on additive secret sharing is proposed.This framework ensures that mobile sensing devices maintain data confidentiality during data exchanges while significantly reducing both communication and computational overhead.Firstly,a series of secure computing protocols are developed using additive secret sharing technology,avoiding reliance on computationally intensive cryptographic primitives to facilitate efficient and secure neural network computations.Secondly,a three-dimensional chaotic encryption scheme is introduced to protect original data from potential attackers during uploads to the edge server.Finally,the correctness and security of the LPMS framework are validated through theoretical analysis and security proofs.Experimental results demonstrate that,compared to the PPFE scheme,the LPMS framework reduces model computation overhead by 73.33% and communication overhead by 68.36%.

Key words: Mobile sensing devices, Convolutional neural networks, Privacy-preserving, Additive secret sharing, Chaotic encryption

CLC Number: 

  • TP309.2
[1]LIM W Y B,LUONG N C,HOANG D T,et al.Federated lear-ning in mobile edge networks:A comprehensive survey[J].IEEE Communications Surveys Tutorials,2020,22(3):2031-2063.
[2]BISWAS A,WANG H C.Autonomous vehicles enabled by the integration of IoT,edge intelligence,5G,and blockchain[J].Sensors,2023,23(4):1963.
[3]WANG Z Y,XIONG H Y,ZHANG J,et al.From personalized medicine to population health:a survey of mHealth sensing techniques[J].IEEE Internet of Things Journal,2022,9(17):15413-15434.
[4]ZHANG Y M,CHEN Y M,BAI X,et al.Adaptive unimodalcost volume filtering for deep stereo matching[C]//Proceedings of the AAAI Conference on Artificial Intelligence.2020:12926-12934.
[5]SIMONYAN K,ZISSERMAN A.Very deep convolutional networks for large-scale image recognition[J].arXiv:1409.1556,2014.
[6]LIU B,DING M,SHAHAM S,et al.When machine learningmeets privacy:A survey and outlook[J].ACM Computing Surveys,2021,54(2):1-36.
[7]LI W D,OU J W.Machine scheduling with restricted rejection:An Application to task offloading in cloud-edge collaborative computing[J].European Journal of Operational Research,2024,314(3):912-919.
[8]GUPTA S,CAMMAROTA R,ŠIMUNIĆ T.Memfhe:End-to-end computing with fully homomorphic encryption in memory[J].ACM Transactions on Embedded Computing Systems,2024,23(2):1-23.
[9]ZHANG J W,KANG X,LIU Y,et al.A secure and lightweight multi-party private intersection-sum scheme over a symmetric cryptosystem[J].Symmetry,2023,15(2):319.
[10]GILAD-BACHRACH R,DOWLIN N,LAINE K,et al.Cryptonets:Applying neural networks to encrypted data with high throughput and accuracy[C]//International Conference on Machine Learning.PMLR,2016:201-210.
[11]MOHASSEL P,RINDAL P.ABY3:A mixed protocol framework for machine learning[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.2018:35-52.
[12]RATHEE D,RATHEE M,KUMAR N,et al.Cryptflow2:Practical 2-party secure inference[C]//Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security.2020:325-342.
[13]DITTMER S,ISHAI Y,LU S,et al.Authenticated garblingfrom simple correlations[C]//Annual International Cryptology Conference.Cham:Springer,2022:57-87.
[14]BORGES R,SEBÉ F.An e-Coin Based Construction for Unlinkable Priced Oblivious Transfer[J].The Computer Journal,2023,67(3):933-940.
[15]XIONG J B,BI R W,ZHAO M F,et al.Edge-assisted privacy-preserving raw data sharing framework for connected autonomous vehicles[J].IEEE Wireless Communications,2020,27(3):24-30.
[16]HUANG K,LIU X M,FU S J,et al.A lightweight privacy-preserving CNN feature extraction framework for mobile sensing[J].IEEE Transactions on Dependable and Secure Computing,2021,18(3):1441-1455.
[17]YANG X,CHEN J,HE K,et al.Efficient privacy-preserving inference outsourcing for convolutional neural networks[J].IEEE Transactions on Information Forensics and Security,2023,18:4815-4829.
[18]PENG Y X,SUN K H,HE S B.A discrete memristor model and its application in Hénon map[J].Chaos,Solitons & Fractals,2020,137:109873.
[19]ZHENG Y Z,LI L,QIAN L,et al.Sine-SSA-BP ship trajectory prediction based on chaotic mapping improved sparrow search algorithm[J].Sensors,2023,23(2):704.
[20]BOGDANOV D,NIITSOO M,TOFT T,et al.High-perfor-mance secure multi-party computation for data mining applications[J].International Journal of Information Security,2012,11:403-418.
[21]ARAKI T,FURUKAWA J,LINDELL Y,et al.High-throughput semi-honest secure three-party computation with an honest majority[C]//Proceedings of the 2016 ACM SIGSAC Confe-rence on Computer and Communications Security.2016:805-817.
[22]QIN Z,YAN J B,REN K,et al.Towards efficient privacy-preserving image feature extraction in cloud computing[C]//Proceedings of the 22nd ACM International Conference on Multimedia.2014:497-506.
[23]WANG J J,HU S S,WANG Q,et al.Privacy-preserving outsourced feature extractions in the cloud:A survey[J].IEEE Network,2017,31(5):36-41.
[24]BEAVER D.Efficient multiparty protocols using circuit ran-domization[C]//Advances in Cryptology(CRYPTO'91).Berlin:Springer,1992:420-432.
[25]XIONG J B,BI R W,TIAN Y L,et al.Toward lightweight,privacy-preserving cooperative object classification for connected autonomous vehicles[J].IEEE Internet of Things Journal,2021,9(4):2787-2801.
[26]BOGDANOV D,LAUR S,WILLEMSON J.Sharemind:Aframework for fast privacy-preserving computations[C]//Computer Security-ESORICS 2008:13th European Symposium on Research in Computer Security.Berlin:Springer,2008:192-206.
[27]GEIGER A,LENZ P,STILLER C,et al.Vision meets robotics:The kitti dataset[J].The International Journal of Robotics Research,2013,32(11):1231-1237.
[28]LIU J,JUUTI M,LU Y,et al.Oblivious neural network predictions via minionn transformations[C]//Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security.2017:619-631.
[29]LI S H,XUE K P,ZHU B,et al.Falcon:A fourier transformbased approach for fast and secure convolutional neural network predictions[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2020:8705-8714.
[1] WEI Xiaohui, GUAN Zeyu, WANG Chenyang, YUE Hengshan, WU Qi. Hardware-Software Co-design Fault-tolerant Strategies for Systolic Array Accelerators [J]. Computer Science, 2025, 52(5): 91-100.
[2] SUN Yang, DING Jianwei, ZHANG Qi, WEI Huiwen, TIAN Bowen. Study on Super-resolution Image Reconstruction Using Residual Feature Aggregation NetworkBased on Attention Mechanism [J]. Computer Science, 2024, 51(6A): 230600039-6.
[3] LIU Hui, JI Ke, CHEN Zhenxiang, SUN Runyuan, MA Kun, WU Jun. Malicious Attack Detection in Recommendation Systems Combining Graph Convolutional Neural Networks and Ensemble Methods [J]. Computer Science, 2024, 51(6A): 230700003-9.
[4] WANG Bin, LI Haixiao, CHEN Rongrong. Dual-color Image Encryption System with Improved Lifting-like Scheme [J]. Computer Science, 2024, 51(6A): 230500007-11.
[5] AN Yang, WANG Xiuqing, ZHAO Minghua. Mobile Robots' Path Planning Method Based on Policy Fusion and Spiking Deep ReinforcementLearning [J]. Computer Science, 2024, 51(11A): 240100211-11.
[6] JIANG Sheng, ZHU Jianhong. Face Micro-expression Recognition Method Based on ME-ResNet [J]. Computer Science, 2024, 51(11A): 231000053-7.
[7] ZENG Congai, LIU Yali, CHEN Shuyi, ZHU Xiuping, NING Jianting. Multi-type K-nearest Neighbor Query Scheme with Mutual Privacy-preserving in Road Networks [J]. Computer Science, 2024, 51(11): 400-417.
[8] LUO Huilan, LONG Jun, LIANG Miaomiao. Attentional Feature Fusion Approach for Siamese Network Based Object Tracking [J]. Computer Science, 2023, 50(6A): 220300237-9.
[9] HUANG Yujiao, CHEN Mingkai, ZHENG Yuan, FAN Xinggang, XIAO Jie, LONG Haixia. Text Classification Based on Weakened Graph Convolutional Networks [J]. Computer Science, 2023, 50(6A): 220700039-5.
[10] ZHAO Min, TIAN Youliang, XIONG Jinbo, BI Renwan, XIE Hongtao. Neural Network Model Training Method Based on Homomorphic Encryption [J]. Computer Science, 2023, 50(5): 372-381.
[11] WANG Xiaofei, FAN Xueqiang, LI Zhangwei. Improving RNA Base Interactions Prediction Based on Transfer Learning and Multi-view Feature Fusion [J]. Computer Science, 2023, 50(3): 164-172.
[12] MEI Pengcheng, YANG Jibin, ZHANG Qiang, HUANG Xiang. Sound Event Joint Estimation Method Based on Three-dimension Convolution [J]. Computer Science, 2023, 50(3): 191-198.
[13] CHEN Qiaosong, WU Jiliang, JIANG Bo, TAN Chongchong, SUN Kaiwei, DEN Xin, WANG Jin. Coupling Local Features and Global Representations for 2D Human Pose Estimation [J]. Computer Science, 2023, 50(11A): 221100007-5.
[14] ZHANG Kaixuan, CAI Guoyong, ZHU Kunri. Image Aesthetics-enhanced Visual Perception Recommendation System [J]. Computer Science, 2023, 50(11A): 221100083-8.
[15] ZHANG Lianfu, TAN Zuowen. Federated Learning Privacy-preserving Approach for Multimodal Medical Data [J]. Computer Science, 2023, 50(11A): 230800021-8.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!