Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{145641,
author = {K.Raja Dilip Kumar and G.AnjanBabu},
title = {The Effective way of Using Fully Homomorphic Encryption Scheme in Secure Tensor Decomposition},
journal = {International Journal of Innovative Research in Technology},
year = {},
volume = {4},
number = {10},
pages = {669-673},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=145641},
abstract = {In the present world of Data there is rapidly growing volume of data are beyond the capabilities of many computing infrastructures, to process securely of that data on cloud has become a preferred solution which can both, to protect data privacy and utilize the powerful capabilities provided by cloud. This paper puts forward a new approach to securely decompose tensor, A mathematical model which are widely used in data-intensive applications, to a core tensor and some truncated orthogonal bases. All the data formats i.e., The structured, semi-structured as well as unstructured data are all transformed to low-order subtensors which are then encrypted using the fully homomorphic encryption scheme. A uniï¬ed high-order cipher tensor model is constructed by collecting all the cipher sub-tensors and embedding them in to a base tensor space. The cipher tensor is decomposed through a proposed secure algorithm these algorithms are used to simplify the way of solving, in which the square root operations are eliminated during the Lanczos procedure by Cornelius Lanczos. This paper makes an analysis of the secure algorithm in terms of time consumption, memory usage and decomposition accuracy. Experimental results reveal that this approach can securely decompose tensor models. With the advancement of fully homomorphic encryption scheme, the proposed secure tensor decomposition method is expected to be widely applied on cloud for privacy},
keywords = {Tensor Decomposition, Fully Homomorphic Encryption, Lanczos Method, Cloud.},
month = {},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry