• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Zhao, Bowen (Zhao, Bowen.) [1] | Chen, Wei-Neng (Chen, Wei-Neng.) [2] | Wei, Feng-Feng (Wei, Feng-Feng.) [3] | Liu, Ximeng (Liu, Ximeng.) [4] (Scholars:刘西蒙) | Pei, Qingqi (Pei, Qingqi.) [5] | Zhang, Jun (Zhang, Jun.) [6]

Indexed by:

EI Scopus SCIE

Abstract:

EA, such as the genetic algorithm (GA), offer an elegant way to handle combinatorial optimization problems (COPs). However, limited by expertise and resources, most users lack the capability to implement evolutionary algorithms (EAs) for solving COPs. An intuitive and promising solution is to outsource evolutionary operations to a cloud server, however, it poses privacy concerns. To this end, this article proposes a novel computing paradigm called evolutionary computation as a service (ECaaS), where a cloud server renders evolutionary computation services for users while ensuring their privacy. Following the concept of ECaaS, this article presents privacy-preserving genetic algorithm (PEGA), a privacy-preserving GA designed specifically for COPs. PEGA enables users, regardless of their domain expertise or resource availability, to outsource COPs to the cloud server that holds a competitive GA and approximates the optimal solution while safeguarding privacy. Notably, PEGA features the following characteristics. First, PEGA empowers users without domain expertise or sufficient resources to solve COPs effectively. Second, PEGA protects the privacy of users by preventing the leakage of optimization problem details. Third, PEGA performs comparably to the conventional GA when approximating the optimal solution. To realize its functionality, we implement PEGA falling in a twin-server architecture and evaluate it on two widely known COPs: 1) the traveling Salesman problem (TSP) and 2) the 0/1 knapsack problem (KP). Particularly, we utilize encryption cryptography to protect users' privacy and carefully design a suite of secure computing protocols to support evolutionary operators of GA on encrypted chromosomes. Privacy analysis demonstrates that PEGA successfully preserves the confidentiality of COP contents. Experimental evaluation results on several TSP datasets and KP datasets reveal that PEGA performs equivalently to the conventional GA in approximating the optimal solution.

Keyword:

Combinatorial optimization ECaaS evolutionary computation privacy protection secure computing

Community:

  • [ 1 ] [Zhao, Bowen]Xidian Univ, Guangzhou Inst Technol, Guangzhou 510555, Peoples R China
  • [ 2 ] [Zhao, Bowen]Shenzhen Univ, Guangdong Key Lab Intelligent Informat Proc, Shenzhen 518060, Peoples R China
  • [ 3 ] [Zhao, Bowen]Shenzhen Univ, Shenzhen Key Lab Media Secur, Shenzhen 518060, Peoples R China
  • [ 4 ] [Chen, Wei-Neng]South China Univ Technol, Sch Comp Sci & Engn, Guangzhou 510640, Peoples R China
  • [ 5 ] [Liu, Ximeng]Fuzhou Univ, Coll Comp & Data Sci, Fuzhou 350108, Fujian, Peoples R China
  • [ 6 ] [Pei, Qingqi]Xidian Univ, Sch Telecommun Engn, Xian 710126, Peoples R China
  • [ 7 ] [Zhang, Jun]Nankai Univ, Coll Artificial Intelligence, Tianjin 300071, Peoples R China
  • [ 8 ] [Zhang, Jun]Hanyang Univ, ERICA, Sch Elect & Engn, Ansan 15588, South Korea

Reprint 's Address:

  • [Zhao, Bowen]Xidian Univ, Guangzhou Inst Technol, Guangzhou 510555, Peoples R China;;[Chen, Wei-Neng]South China Univ Technol, Sch Comp Sci & Engn, Guangzhou 510640, Peoples R China

Show more details

Related Keywords:

Source :

IEEE TRANSACTIONS ON CYBERNETICS

ISSN: 2168-2267

Year: 2024

Issue: 6

Volume: 54

Page: 3638-3651

9 . 4 0 0

JCR@2023

Cited Count:

WoS CC Cited Count: 3

SCOPUS Cited Count: 5

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Online/Total:83/10047338
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1