Privacy-preserving word vectors learning using partially homomorphic encryption

IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS
Shang Ci , Sen Hu , Donghai Guan , Çetin Kaya Koç
{"title":"Privacy-preserving word vectors learning using partially homomorphic encryption","authors":"Shang Ci ,&nbsp;Sen Hu ,&nbsp;Donghai Guan ,&nbsp;Çetin Kaya Koç","doi":"10.1016/j.jisa.2025.103999","DOIUrl":null,"url":null,"abstract":"<div><div>This paper introduces a privacy-preserving scheme for learning <strong>GloVe</strong> word vectors on encrypted data. Users first encrypt their private data using a partially homomorphic encryption algorithm and then send the ciphertext to a cloud server to execute the proposed scheme. The cloud server generates high-quality word vectors for subsequent machine learning tasks by filtering out disturbances. We conduct a theoretical analysis of the security and efficiency of the proposed approach. Experimental results on real-world datasets demonstrate that our scheme effectively trains word vectors without compromising user privacy or the integrity of the word vector model, while keeping the user-side implementation lightweight and offline.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"89 ","pages":"Article 103999"},"PeriodicalIF":3.8000,"publicationDate":"2025-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625000377","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

This paper introduces a privacy-preserving scheme for learning GloVe word vectors on encrypted data. Users first encrypt their private data using a partially homomorphic encryption algorithm and then send the ciphertext to a cloud server to execute the proposed scheme. The cloud server generates high-quality word vectors for subsequent machine learning tasks by filtering out disturbances. We conduct a theoretical analysis of the security and efficiency of the proposed approach. Experimental results on real-world datasets demonstrate that our scheme effectively trains word vectors without compromising user privacy or the integrity of the word vector model, while keeping the user-side implementation lightweight and offline.
求助全文
约1分钟内获得全文 求助全文
来源期刊
Journal of Information Security and Applications
Journal of Information Security and Applications Computer Science-Computer Networks and Communications
CiteScore
10.90
自引率
5.40%
发文量
206
审稿时长
56 days
期刊介绍: Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信