• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chang Yan, Lin Yusheng, Huang Siwei, Zhang Shibin. Quantum K-Nearest Neighbor Classification Algorithm for Privacy Data Analysis of Industrial Internet[J]. Journal of Computer Research and Development, 2022, 59(5): 1082-1091. DOI: 10.7544/issn1000-1239.20211146
Citation: Chang Yan, Lin Yusheng, Huang Siwei, Zhang Shibin. Quantum K-Nearest Neighbor Classification Algorithm for Privacy Data Analysis of Industrial Internet[J]. Journal of Computer Research and Development, 2022, 59(5): 1082-1091. DOI: 10.7544/issn1000-1239.20211146

Quantum K-Nearest Neighbor Classification Algorithm for Privacy Data Analysis of Industrial Internet

Funds: This work was supported by the National Natural Science Foundation of China (62076042, 62102049) and the Key Research and Development Project of Sichuan Province (2021YFSY0012, 2020YFG0307, 2021YFG0332).
More Information
  • Published Date: April 30, 2022
  • It is of great significance to analyze and utilize the massive human, machine, thing and system data contained in industrial Internet to optimize the manufacturing system and service system covering the whole industrial chain and value chain. However, the processing and analysis of industrial Internet big data brings us opportunities at the same time, but also unprecedented privacy concerns. Privacy security is an important part of industrial Internet security. Research on big data analysis algorithms of industrial Internet with privacy protection has been very urgent and severe. Industrial Internet big data processing also has higher requirements for privacy, efficiency and accuracy. We propose a quantum K-nearest neighbor (KNN) algorithm with privacy-protecting characteristics, and find an encryption method for the original training sample set and the sample to be tested, so that the ciphertext sample input to the quantum cloud server can get the same prediction result as the original sample input. In this algorithm, because of the inversion of a prediction result corresponding to N+1 input data, it is difficult to deduce the model, parameters, input data and related attribute characteristics from the prediction results obtained by multiple visits to the quantum cloud server. Therefore, the proposed algorithm can well resist model extraction attack, model reverse attack, member inference attack, attribute inference attack and so on. Compared with the existing quantum machine learning algorithm with privacy protection, it is found that the privacy protection scheme in this paper is superior to the existing schemes in three aspects of privacy, complexity and availability, which achieves privacy protection without increasing additional computing overhead, reducing the efficiency and availability of the algorithm, and affecting the accuracy of the algorithm. We provide a new method to protect the privacy of quantum machine learning and a new idea to improve the comprehensive performance of industrial Internet big data analysis in terms of privacy, efficiency and accuracy, which has important theoretical value and practical significance.
  • Related Articles

    [1]Bai Lifang, Zhu Yuefei, Li Yongjun, Wang Shuai, Yang Xiaoqi. Research Progress of Fully Homomorphic Encryption[J]. Journal of Computer Research and Development, 2024, 61(12): 3069-3087. DOI: 10.7544/issn1000-1239.202221052
    [2]Zhao Xiufeng, Fu Yu, Song Weitao. Circular Secure Homomorphic Encryption Scheme[J]. Journal of Computer Research and Development, 2020, 57(10): 2117-2124. DOI: 10.7544/issn1000-1239.2020.20200422
    [3]Yao Hailong, Wang Caifen, Xu Qinbai, Li Wenting. A Distributed Biometric Authentication Protocol Based on Homomorphic Encryption[J]. Journal of Computer Research and Development, 2019, 56(11): 2375-2383. DOI: 10.7544/issn1000-1239.2019.20190293
    [4]Li Zengpeng, Ma Chunguang, Zhao Minghao. Leveled Fully Homomorphic Encryption Against Adaptive Key Recovery Attacks[J]. Journal of Computer Research and Development, 2019, 56(3): 496-507. DOI: 10.7544/issn1000-1239.2019.20170443
    [5]Xu Wenyu, Wu Lei, Yan Yunxue. Privacy-Preserving Scheme of Electronic Health Records Based on Blockchain and Homomorphic Encryption[J]. Journal of Computer Research and Development, 2018, 55(10): 2233-2243. DOI: 10.7544/issn1000-1239.2018.20180438
    [6]Chen Zhigang, Song Xinxia, Zhao Xiufeng. A Multi-Bit Fully Homomorphic Encryption with Better Key Size from LWE[J]. Journal of Computer Research and Development, 2016, 53(10): 2216-2223. DOI: 10.7544/issn1000-1239.2016.20160431
    [7]Yang Xiaoyuan, Zhou Tanping, Zhang Wei, Wu Liqiang. Application of a Circular Secure Variant of LWE in the Homomorphic Encryption[J]. Journal of Computer Research and Development, 2015, 52(6): 1389-1393. DOI: 10.7544/issn1000-1239.2015.20131952
    [8]Li Shundong, Dou Jiawei, Wang Daoshun. Survey on Homomorphic Encryption and Its Applications to Cloud Security[J]. Journal of Computer Research and Development, 2015, 52(6): 1378-1388. DOI: 10.7544/issn1000-1239.2015.20131494
    [9]Hao Xiulan, Tao Xiaopeng, Xu Hexiang, Hu Yunfa. A Strategy to Class Imbalance Problem for kNN Text Classifier[J]. Journal of Computer Research and Development, 2009, 46(1): 52-61.
    [10]Song Yan. Homomorphic Commitment Schemes Based on Bilinear Groups[J]. Journal of Computer Research and Development, 2007, 44(9): 1532-1537.
  • Cited by

    Periodical cited type(6)

    1. 从传锋. 云计算下去中心化双重差分隐私数据保护算法. 吉林大学学报(信息科学版). 2024(01): 14-19 .
    2. 李兴,吴天宇,马光明. 基于全同态加密的电力运行数据隐私保护方法. 长江信息通信. 2024(06): 140-142 .
    3. 王建国,高友江. 人工智能广告的负面效应:基于顾客旅程的理论视角. 江南大学学报(人文社会科学版). 2024(04): 51-64 .
    4. 王芳. 基于Python爬虫技术的互联网数据抓取方法设计. 信息与电脑(理论版). 2023(07): 41-43 .
    5. 马召贵. 基于改进KNN的不均衡信息文本分类算法. 信息与电脑(理论版). 2023(12): 85-87 .
    6. 胡建平,严永康. 半监督学习算法下数字化信息归并分类仿真. 计算机仿真. 2023(12): 502-505+562 .

    Other cited types(8)

Catalog

    Article views (371) PDF downloads (219) Cited by(14)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return