PEGA: A Privacy-Preserving Genetic Algorithm for Combinatorial Optimization
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zhao, Bowen | - |
dc.contributor.author | Chen, Wei-Neng | - |
dc.contributor.author | Wei, Feng-Feng | - |
dc.contributor.author | Liu, Ximeng | - |
dc.contributor.author | Pei, Qingqi | - |
dc.contributor.author | Zhang, Jun | - |
dc.date.accessioned | 2024-04-09T04:03:21Z | - |
dc.date.available | 2024-04-09T04:03:21Z | - |
dc.date.issued | 2024-01 | - |
dc.identifier.issn | 2168-2267 | - |
dc.identifier.issn | 2168-2275 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/118695 | - |
dc.description.abstract | EA, such as the genetic algorithm (GA), offer an elegant way to handle combinatorial optimization problems (COPs). However, limited by expertise and resources, most users lack the capability to implement evolutionary algorithms (EAs) for solving COPs. An intuitive and promising solution is to outsource evolutionary operations to a cloud server, however, it poses privacy concerns. To this end, this article proposes a novel computing paradigm called evolutionary computation as a service (ECaaS), where a cloud server renders evolutionary computation services for users while ensuring their privacy. Following the concept of ECaaS, this article presents privacy-preserving genetic algorithm (PEGA), a privacy-preserving GA designed specifically for COPs. PEGA enables users, regardless of their domain expertise or resource availability, to outsource COPs to the cloud server that holds a competitive GA and approximates the optimal solution while safeguarding privacy. Notably, PEGA features the following characteristics. First, PEGA empowers users without domain expertise or sufficient resources to solve COPs effectively. Second, PEGA protects the privacy of users by preventing the leakage of optimization problem details. Third, PEGA performs comparably to the conventional GA when approximating the optimal solution. To realize its functionality, we implement PEGA falling in a twin-server architecture and evaluate it on two widely known COPs: 1) the traveling Salesman problem (TSP) and 2) the 0/1 knapsack problem (KP). Particularly, we utilize encryption cryptography to protect users’ privacy and carefully design a suite of secure computing protocols to support evolutionary operators of GA on encrypted chromosomes. Privacy analysis demonstrates that PEGA successfully preserves the confidentiality of COP contents. Experimental evaluation results on several TSP datasets and KP datasets reveal that PEGA performs equivalently to the conventional GA in approximating the optimal solution. IEEE | - |
dc.format.extent | 14 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | IEEE Advancing Technology for Humanity | - |
dc.title | PEGA: A Privacy-Preserving Genetic Algorithm for Combinatorial Optimization | - |
dc.type | Article | - |
dc.publisher.location | 미국 | - |
dc.identifier.doi | 10.1109/TCYB.2023.3346863 | - |
dc.identifier.scopusid | 2-s2.0-85182935979 | - |
dc.identifier.wosid | 001174076900001 | - |
dc.identifier.bibliographicCitation | IEEE Transactions on Cybernetics, v.54, no.6, pp 1 - 14 | - |
dc.citation.title | IEEE Transactions on Cybernetics | - |
dc.citation.volume | 54 | - |
dc.citation.number | 6 | - |
dc.citation.startPage | 1 | - |
dc.citation.endPage | 14 | - |
dc.type.docType | Article; Early Access | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Automation & Control Systems | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Automation & Control Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Artificial Intelligence | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Cybernetics | - |
dc.subject.keywordAuthor | Combinatorial optimization | - |
dc.subject.keywordAuthor | ECaaS | - |
dc.subject.keywordAuthor | Evolutionary computation | - |
dc.subject.keywordAuthor | evolutionary computation | - |
dc.subject.keywordAuthor | Genetic algorithms | - |
dc.subject.keywordAuthor | Optimization | - |
dc.subject.keywordAuthor | Privacy | - |
dc.subject.keywordAuthor | privacy protection | - |
dc.subject.keywordAuthor | secure computing | - |
dc.subject.keywordAuthor | Servers | - |
dc.subject.keywordAuthor | Sociology | - |
dc.subject.keywordAuthor | Statistics | - |
dc.identifier.url | https://ieeexplore.ieee.org/document/10398448 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.