Yizhuo Zhang, Yiwei Liu, Chan-Liang Chung, Chi-Hua Chen, F. Hwang
{"title":"Multiple Linear Regression Based on Stream Homomorphic Encryption Computing","authors":"Yizhuo Zhang, Yiwei Liu, Chan-Liang Chung, Chi-Hua Chen, F. Hwang","doi":"10.1109/IS3C50286.2020.00144","DOIUrl":null,"url":null,"abstract":"This study proposes a multiple linear regression architecture based on stream homomorphic encryption computing to analyze ciphertext for massive secure data computing. The proposed architecture contains three subsystems including terminal subsystem, data access subsystem, and data computing subsystem. The method used behind the presented architecture contains four stages which are data preprocessing stage, data access stage, data computing stage, and result processing stage. In the practical experiments, a case study of traffic information prediction was selected to evaluate the proposed system and method. The predicted traffic information was generated by the proposed method in accordance with the encrypted traffic information. Our experimental results showed that the proposed architecture can effectively and promptly obtain the predicted traffic information.","PeriodicalId":143430,"journal":{"name":"2020 International Symposium on Computer, Consumer and Control (IS3C)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Symposium on Computer, Consumer and Control (IS3C)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IS3C50286.2020.00144","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
This study proposes a multiple linear regression architecture based on stream homomorphic encryption computing to analyze ciphertext for massive secure data computing. The proposed architecture contains three subsystems including terminal subsystem, data access subsystem, and data computing subsystem. The method used behind the presented architecture contains four stages which are data preprocessing stage, data access stage, data computing stage, and result processing stage. In the practical experiments, a case study of traffic information prediction was selected to evaluate the proposed system and method. The predicted traffic information was generated by the proposed method in accordance with the encrypted traffic information. Our experimental results showed that the proposed architecture can effectively and promptly obtain the predicted traffic information.