Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

PEGA: A Privacy-Preserving Genetic Algorithm for Combinatorial Optimization

Full metadata record
DC Field Value Language
dc.contributor.authorZhao, Bowen-
dc.contributor.authorChen, Wei-Neng-
dc.contributor.authorWei, Feng-Feng-
dc.contributor.authorLiu, Ximeng-
dc.contributor.authorPei, Qingqi-
dc.contributor.authorZhang, Jun-
dc.date.accessioned2024-04-09T04:03:21Z-
dc.date.available2024-04-09T04:03:21Z-
dc.date.issued2024-01-
dc.identifier.issn2168-2267-
dc.identifier.issn2168-2275-
dc.identifier.urihttps://scholarworks.bwise.kr/erica/handle/2021.sw.erica/118695-
dc.description.abstractEA, such as the genetic algorithm (GA), offer an elegant way to handle combinatorial optimization problems (COPs). However, limited by expertise and resources, most users lack the capability to implement evolutionary algorithms (EAs) for solving COPs. An intuitive and promising solution is to outsource evolutionary operations to a cloud server, however, it poses privacy concerns. To this end, this article proposes a novel computing paradigm called evolutionary computation as a service (ECaaS), where a cloud server renders evolutionary computation services for users while ensuring their privacy. Following the concept of ECaaS, this article presents privacy-preserving genetic algorithm (PEGA), a privacy-preserving GA designed specifically for COPs. PEGA enables users, regardless of their domain expertise or resource availability, to outsource COPs to the cloud server that holds a competitive GA and approximates the optimal solution while safeguarding privacy. Notably, PEGA features the following characteristics. First, PEGA empowers users without domain expertise or sufficient resources to solve COPs effectively. Second, PEGA protects the privacy of users by preventing the leakage of optimization problem details. Third, PEGA performs comparably to the conventional GA when approximating the optimal solution. To realize its functionality, we implement PEGA falling in a twin-server architecture and evaluate it on two widely known COPs: 1) the traveling Salesman problem (TSP) and 2) the 0/1 knapsack problem (KP). Particularly, we utilize encryption cryptography to protect users’ privacy and carefully design a suite of secure computing protocols to support evolutionary operators of GA on encrypted chromosomes. Privacy analysis demonstrates that PEGA successfully preserves the confidentiality of COP contents. Experimental evaluation results on several TSP datasets and KP datasets reveal that PEGA performs equivalently to the conventional GA in approximating the optimal solution. IEEE-
dc.format.extent14-
dc.language영어-
dc.language.isoENG-
dc.publisherIEEE Advancing Technology for Humanity-
dc.titlePEGA: A Privacy-Preserving Genetic Algorithm for Combinatorial Optimization-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1109/TCYB.2023.3346863-
dc.identifier.scopusid2-s2.0-85182935979-
dc.identifier.wosid001174076900001-
dc.identifier.bibliographicCitationIEEE Transactions on Cybernetics, v.54, no.6, pp 1 - 14-
dc.citation.titleIEEE Transactions on Cybernetics-
dc.citation.volume54-
dc.citation.number6-
dc.citation.startPage1-
dc.citation.endPage14-
dc.type.docTypeArticle; Early Access-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaAutomation & Control Systems-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryAutomation & Control Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Artificial Intelligence-
dc.relation.journalWebOfScienceCategoryComputer Science, Cybernetics-
dc.subject.keywordAuthorCombinatorial optimization-
dc.subject.keywordAuthorECaaS-
dc.subject.keywordAuthorEvolutionary computation-
dc.subject.keywordAuthorevolutionary computation-
dc.subject.keywordAuthorGenetic algorithms-
dc.subject.keywordAuthorOptimization-
dc.subject.keywordAuthorPrivacy-
dc.subject.keywordAuthorprivacy protection-
dc.subject.keywordAuthorsecure computing-
dc.subject.keywordAuthorServers-
dc.subject.keywordAuthorSociology-
dc.subject.keywordAuthorStatistics-
dc.identifier.urlhttps://ieeexplore.ieee.org/document/10398448-
Files in This Item
Go to Link
Appears in
Collections
COLLEGE OF ENGINEERING SCIENCES > SCHOOL OF ELECTRICAL ENGINEERING > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher ZHANG, Jun photo

ZHANG, Jun
ERICA 공학대학 (SCHOOL OF ELECTRICAL ENGINEERING)
Read more

Altmetrics

Total Views & Downloads

BROWSE