The Effective way of Using Fully Homomorphic Encryption Scheme in Secure Tensor Decomposition

  • Unique Paper ID: 145641
  • PageNo: 669-673
  • Abstract:
  • In the present world of Data there is rapidly growing volume of data are beyond the capabilities of many computing infrastructures, to process securely of that data on cloud has become a preferred solution which can both, to protect data privacy and utilize the powerful capabilities provided by cloud. This paper puts forward a new approach to securely decompose tensor, A mathematical model which are widely used in data-intensive applications, to a core tensor and some truncated orthogonal bases. All the data formats i.e., The structured, semi-structured as well as unstructured data are all transformed to low-order subtensors which are then encrypted using the fully homomorphic encryption scheme. A unified high-order cipher tensor model is constructed by collecting all the cipher sub-tensors and embedding them in to a base tensor space. The cipher tensor is decomposed through a proposed secure algorithm these algorithms are used to simplify the way of solving, in which the square root operations are eliminated during the Lanczos procedure by Cornelius Lanczos. This paper makes an analysis of the secure algorithm in terms of time consumption, memory usage and decomposition accuracy. Experimental results reveal that this approach can securely decompose tensor models. With the advancement of fully homomorphic encryption scheme, the proposed secure tensor decomposition method is expected to be widely applied on cloud for privacy
add_icon3email to a friend

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{145641,
        author = {K.Raja Dilip Kumar and G.AnjanBabu},
        title = {The Effective way of Using Fully Homomorphic Encryption Scheme in Secure Tensor Decomposition},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {4},
        number = {10},
        pages = {669-673},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=145641},
        abstract = {In the present world of Data there is rapidly growing volume of data are beyond the capabilities of many computing infrastructures, to process securely of that data on cloud has become a preferred solution which can both, to protect data privacy and utilize the powerful capabilities provided by cloud. This paper puts forward a new approach to securely decompose tensor, A mathematical model which are widely used in data-intensive applications, to a core tensor and some truncated orthogonal bases. All the data formats i.e., The structured, semi-structured as well as unstructured data are all transformed to low-order subtensors which are then encrypted using the fully homomorphic encryption scheme. A unified high-order cipher tensor model is constructed by collecting all the cipher sub-tensors and embedding them in to a base tensor space. The cipher tensor is decomposed through a proposed secure algorithm these algorithms are used to simplify the way of solving, in which the square root operations are eliminated during the Lanczos procedure by Cornelius Lanczos. This paper makes an analysis of the secure algorithm in terms of time consumption, memory usage and decomposition accuracy. Experimental results reveal that this approach can securely decompose tensor models. With the advancement of fully homomorphic encryption scheme, the proposed secure tensor decomposition method is expected to be widely applied on cloud for privacy},
        keywords = {Tensor Decomposition, Fully Homomorphic Encryption, Lanczos Method, Cloud.},
        month = {},
        }

Cite This Article

Kumar, K. D., & G.AnjanBabu, (). The Effective way of Using Fully Homomorphic Encryption Scheme in Secure Tensor Decomposition. International Journal of Innovative Research in Technology (IJIRT), 4(10), 669–673.

Related Articles