Using Granule to Search Privacy Preserving Voice in Home IoT Systems

The Home IoT Voice System (HIVS) such as Amazon Alexa or Apple Siri can provide voice-based interfaces for people to conduct the search tasks using their voice. However, how to protect privacy is a big challenge. This paper proposes a novel personalized search scheme of encrypting voice with privacy...

Full description

Bibliographic Details
Main Authors: Wei Li, Yumin Chen, Huosheng Hu, Chao Tang
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8990080/
_version_ 1818917582124613632
author Wei Li
Yumin Chen
Huosheng Hu
Chao Tang
author_facet Wei Li
Yumin Chen
Huosheng Hu
Chao Tang
author_sort Wei Li
collection DOAJ
description The Home IoT Voice System (HIVS) such as Amazon Alexa or Apple Siri can provide voice-based interfaces for people to conduct the search tasks using their voice. However, how to protect privacy is a big challenge. This paper proposes a novel personalized search scheme of encrypting voice with privacy-preserving by the granule computing technique. Firstly, Mel-Frequency Cepstrum Coefficients (MFCC) are used to extract voice features. These features are obfuscated by obfuscation function to protect them from being disclosed the server. Secondly, a series of definitions are presented, including fuzzy granule, fuzzy granule vector, ciphertext granule, operators and metrics. Thirdly, the AES method is used to encrypt voices. A scheme of searchable encrypted voice is designed by creating the fuzzy granule of obfuscation features of voices and the ciphertext granule of the voice. The experiments are conducted on corpus including English, Chinese and Arabic. The results show the feasibility and good performance of the proposed scheme.
first_indexed 2024-12-20T00:36:21Z
format Article
id doaj.art-11c31fa88cff4ad8ac06210ec7d1556e
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-20T00:36:21Z
publishDate 2020-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-11c31fa88cff4ad8ac06210ec7d1556e2022-12-21T19:59:44ZengIEEEIEEE Access2169-35362020-01-018319573196910.1109/ACCESS.2020.29729758990080Using Granule to Search Privacy Preserving Voice in Home IoT SystemsWei Li0https://orcid.org/0000-0002-4308-4385Yumin Chen1https://orcid.org/0000-0003-1981-5827Huosheng Hu2Chao Tang3School of Computer and Information Engineering, Xiamen University of Technology, Xiamen, ChinaSchool of Computer and Information Engineering, Xiamen University of Technology, Xiamen, ChinaSchool of Computer Science and Electronic Engineering, University of Essex, Colchester, U.K.Department of Computer Science and Technology, Hefei University, Hefei, ChinaThe Home IoT Voice System (HIVS) such as Amazon Alexa or Apple Siri can provide voice-based interfaces for people to conduct the search tasks using their voice. However, how to protect privacy is a big challenge. This paper proposes a novel personalized search scheme of encrypting voice with privacy-preserving by the granule computing technique. Firstly, Mel-Frequency Cepstrum Coefficients (MFCC) are used to extract voice features. These features are obfuscated by obfuscation function to protect them from being disclosed the server. Secondly, a series of definitions are presented, including fuzzy granule, fuzzy granule vector, ciphertext granule, operators and metrics. Thirdly, the AES method is used to encrypt voices. A scheme of searchable encrypted voice is designed by creating the fuzzy granule of obfuscation features of voices and the ciphertext granule of the voice. The experiments are conducted on corpus including English, Chinese and Arabic. The results show the feasibility and good performance of the proposed scheme.https://ieeexplore.ieee.org/document/8990080/Fuzzy searchgranule computingk-nearest neighborsearchable encrypted voiceobfuscation function
spellingShingle Wei Li
Yumin Chen
Huosheng Hu
Chao Tang
Using Granule to Search Privacy Preserving Voice in Home IoT Systems
IEEE Access
Fuzzy search
granule computing
k-nearest neighbor
searchable encrypted voice
obfuscation function
title Using Granule to Search Privacy Preserving Voice in Home IoT Systems
title_full Using Granule to Search Privacy Preserving Voice in Home IoT Systems
title_fullStr Using Granule to Search Privacy Preserving Voice in Home IoT Systems
title_full_unstemmed Using Granule to Search Privacy Preserving Voice in Home IoT Systems
title_short Using Granule to Search Privacy Preserving Voice in Home IoT Systems
title_sort using granule to search privacy preserving voice in home iot systems
topic Fuzzy search
granule computing
k-nearest neighbor
searchable encrypted voice
obfuscation function
url https://ieeexplore.ieee.org/document/8990080/
work_keys_str_mv AT weili usinggranuletosearchprivacypreservingvoiceinhomeiotsystems
AT yuminchen usinggranuletosearchprivacypreservingvoiceinhomeiotsystems
AT huoshenghu usinggranuletosearchprivacypreservingvoiceinhomeiotsystems
AT chaotang usinggranuletosearchprivacypreservingvoiceinhomeiotsystems