首页 | 本学科首页   官方微博 | 高级检索  
     

云计算环境下安全的极限学习机外包机制
引用本文:林加润,殷建平,蔡志平,朱明,程勇. 云计算环境下安全的极限学习机外包机制[J]. 计算机工程与科学, 2015, 37(10): 1806-1810
作者姓名:林加润  殷建平  蔡志平  朱明  程勇
作者单位:;1.国防科学技术大学计算机学院;2.国防科学技术大学信息中心
基金项目:国家自然科学基金资助项目(61379145,61170287,61232016,61070198,61402508)
摘    要:应用程序中涉及到的数据日益扩大且结构日益复杂,使得在大规模数据上运行极限学习机ELM成为一个具有挑战性的任务。为了应对这一挑战,提出了一个在云计算环境下安全和实用的ELM外包机制。该机制将ELM显式地分为私有部分和公有部分,可以有效地减少训练时间,并确保算法输入与输出的安全性。私有部分主要负责随机参数的生成和一些简单的矩阵计算;公有部分外包到云计算服务器中,由云计算服务商负责ELM算法中计算量最大的计算Moore-Penrose广义逆的操作。该广义逆也作为证据以验证结果的正确性和可靠性。我们从理论上对该外包机制的安全性进行了分析。在CIFAR-10数据集上的实验结果表明,我们所提出的机制可以有效地减少用户的计算量。

关 键 词:极限学习机  云计算  计算外包  数据安全  隐私保护  结果验证
收稿时间:2015-08-10
修稿时间:2015-10-25

Secure outsourcing of extreme learning machine in cloud computing
LIN Jia run,YIN Jian ping,CAI Zhi ping,ZHU Ming,CHENG Yong. Secure outsourcing of extreme learning machine in cloud computing[J]. Computer Engineering & Science, 2015, 37(10): 1806-1810
Authors:LIN Jia run  YIN Jian ping  CAI Zhi ping  ZHU Ming  CHENG Yong
Affiliation:(1.College of Computer,National University of Defense Technology,Changsha 410073;2.Information Center,National University of Defense Technology,Changsha 410073,China)
Abstract:Duo to the enlarging volume and increasingly complex structure of data involved in applications, running the extreme learning machine (ELM) over large scale data becomes a challenging task.In order to reduce the training time while assuring the confidentiality of ELM’s input and output, we present a secure and practical outsourcing mechanism for ELM in cloud computing.In this mechanism, we explicitly divide the ELM into two parts: public part and private part.The latter is executed locally to generate random parameters and do some simple matrix computation while the former part is outsourced by cloud computing that is mainly responsible for calculating the Moore Penrose generalized inverse, the heaviest computational operation. The inverse also serves as the correctness and soundness proof in result verification.We analyze the confidentiality theoretically and the experimental results demonstrate that the proposed mechanism can effectively release customers from heavy computation.
Keywords:cloud computing  extreme learning machine  computing outsourcing  data security  privacy-preserving  result verification,
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机工程与科学》浏览原始摘要信息
点击此处可从《计算机工程与科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号