209 0

Full metadata record

DC FieldValueLanguage
dc.contributor.authorJun Zhang, Jun-
dc.date.accessioned2024-02-01T04:10:28Z-
dc.date.available2024-02-01T04:10:28Z-
dc.date.issued2024-01-12-
dc.identifier.citationIEEE TRANSACTIONS ON CYBERNETICSen_US
dc.identifier.issn2168-2267en_US
dc.identifier.urihttps://ieeexplore.ieee.org/document/10398448en_US
dc.identifier.urihttps://repository.hanyang.ac.kr/handle/20.500.11754/188133-
dc.description.abstractEA, such as the genetic algorithm (GA), offer an elegant way to handle combinatorial optimization problems (COPs). However, limited by expertise and resources, most users lack the capability to implement evolutionary algorithms (EAs) for solving COPs. An intuitive and promising solution is to outsource evolutionary operations to a cloud server, however, it poses privacy concerns. To this end, this article proposes a novel computing paradigm called evolutionary computation as a service (ECaaS), where a cloud server renders evolutionary computation services for users while ensuring their privacy. Following the concept of ECaaS, this article presents privacy-preserving genetic algorithm (PEGA), a privacy-preserving GA designed specifically for COPs. PEGA enables users, regardless of their domain expertise or resource availability, to outsource COPs to the cloud server that holds a competitive GA and approximates the optimal solution while safeguarding privacy. Notably, PEGA features the following characteristics. First, PEGA empowers users without domain expertise or sufficient resources to solve COPs effectively. Second, PEGA protects the privacy of users by preventing the leakage of optimization problem details. Third, PEGA performs comparably to the conventional GA when approximating the optimal solution. To realize its functionality, we implement PEGA falling in a twin-server architecture and evaluate it on two widely known COPs: 1) the traveling Salesman problem (TSP) and 2) the 0/1 knapsack problem (KP). Particularly, we utilize encryption cryptography to protect users’ privacy and carefully design a suite of secure computing protocols to support evolutionary operators of GA on encrypted chromosomes. Privacy analysis demonstrates that PEGA successfully preserves the confidentiality of COP contents. Experimental evaluation results on several TSP datasets and KP datasets reveal that PEGA performs equivalently to the conventional GA in approximating the optimal solution.en_US
dc.languageen_USen_US
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCen_US
dc.relation.ispartofseries;1-14-
dc.subjectCombinatorial optimizationen_US
dc.subjectevolutionary computationen_US
dc.subjectECaaSen_US
dc.subjectprivacy protectionen_US
dc.subjectsecure computingen_US
dc.subjectServersen_US
dc.subjectGenetic algorithmsen_US
dc.subjectStatistics , Sociologyen_US
dc.titlePEGA: A Privacy-Preserving Genetic Algorithm for Combinatorial Optimizationen_US
dc.typeArticleen_US
dc.identifier.doi10.1109/TCYB.2023.3346863en_US
dc.relation.page1-14-
dc.relation.journalIEEE TRANSACTIONS ON CYBERNETICS-
dc.contributor.googleauthorZhao, Bowen-
dc.contributor.googleauthorChen, Wei-Neng-
dc.contributor.googleauthorWei, Feng-Feng-
dc.contributor.googleauthorLiu, Ximeng-
dc.contributor.googleauthorPei, Qingqi-
dc.contributor.googleauthorZhang, Jun-
dc.relation.code2024003315-
dc.sector.campusE-
dc.sector.daehakCOLLEGE OF ENGINEERING SCIENCES[E]-
dc.sector.departmentSCHOOL OF ELECTRICAL ENGINEERING-
dc.identifier.pidjunzhanghk-
Appears in Collections:
COLLEGE OF ENGINEERING SCIENCES[E](공학대학) > ELECTRICAL ENGINEERING(전자공학부) > Articles
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE