2020
DOI: 10.1007/s10207-020-00506-7
|View full text |Cite
|
Sign up to set email alerts
|

Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 35 publications
0
7
0
Order By: Relevance
“…Reversible data hiding in encrypted image (RDH-EI) technology is a technology that embeds secret information in encrypted images in a reversible way, and after the information is extracted losslessly, the original image can be restored losslessly [15], which is the combination and development of reversible information hiding technology and encryption technology. Based on the original intention of privacy protection, the RDH-EI algorithm applied to cloud storage scenarios should provide users with a simple and secure image encryption method on the user side to protect user privacy; in order to facilitate the management of ciphertext images by cloud service providers, the RDH-EI algorithm should be provided with large hidden capacity; at the receiving end, high-quality decrypted images and restored original images that are completely consistent with the original images are reasonable requirements that the RDH-EI algorithm should meet [16]. Most of the existing encrypted image reversible information hiding algorithms are based on the symmetric encryption domain, use stream cipher to encrypt the original image bitwise XOR, and use the spatial correlation of the image to reconstruct the original image.…”
Section: Introductionmentioning
confidence: 99%
“…Reversible data hiding in encrypted image (RDH-EI) technology is a technology that embeds secret information in encrypted images in a reversible way, and after the information is extracted losslessly, the original image can be restored losslessly [15], which is the combination and development of reversible information hiding technology and encryption technology. Based on the original intention of privacy protection, the RDH-EI algorithm applied to cloud storage scenarios should provide users with a simple and secure image encryption method on the user side to protect user privacy; in order to facilitate the management of ciphertext images by cloud service providers, the RDH-EI algorithm should be provided with large hidden capacity; at the receiving end, high-quality decrypted images and restored original images that are completely consistent with the original images are reasonable requirements that the RDH-EI algorithm should meet [16]. Most of the existing encrypted image reversible information hiding algorithms are based on the symmetric encryption domain, use stream cipher to encrypt the original image bitwise XOR, and use the spatial correlation of the image to reconstruct the original image.…”
Section: Introductionmentioning
confidence: 99%
“…When the characteristics of each node not only correspond to different variables but also contain spatiotemporal information, the convolution operation is performed on the basis of the spatiotemporal relationship in the Internet, and then, the extracted features can have both the temporal and spatial characteristics of the process. In the process of training, the network can coordinate the learning of temporal and spatial relationships to obtain the intrusion characteristics of spatiotemporal information in the fusion process [29]. Therefore, the soft measurement application can be realized on the basis of collaborative learning of process spatiotemporal characteristics.…”
Section: Multiple Spatiotemporal Models For Lstmmentioning
confidence: 99%
“…In the training process of the deep network, the LSTM and the spatiotemporal model can cooperate with each other in the learning of time series characteristics and spatial characteristics [29] and have the advantages of both. First, the process variables are input into p separate channels, and each channel represents a variable, and the LSTM layer is used to extract the timing features for different variables; then, the timing features extracted by each channel are used as nodes 4…”
Section: Multiple Spatiotemporal Models For Lstmmentioning
confidence: 99%
See 1 more Smart Citation
“…Existing solutions for privacy-preserving collaborative intrusion detection use homomorphic encryption [2], [3] or secure multi-party computation [4], [5] techniques. The idea is to use these techniques to correlate or aggregate alerts generated from local IDS.…”
Section: Introductionmentioning
confidence: 99%