Efficient Privacy-Preserving Logistic Model With Malicious Security

被引:0
|
作者
Miao, Guanhong [1 ]
Wu, Samuel S. [2 ]
机构
[1] Univ Florida, Dept Epidemiol, Gainesville, FL 32611 USA
[2] Univ Florida, Dept Biostat, Gainesville, FL 32611 USA
基金
美国国家卫生研究院;
关键词
Encryption; Computational modeling; Servers; Logistics; TV; Protocols; Data models; Privacy-preserving; logistic model; malicious adversary; indistinguishability;
D O I
10.1109/TIFS.2024.3402319
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Conducting secure computations to protect against malicious adversaries is an emerging field of research. Current models designed for malicious security typically necessitate the involvement of two or more servers in an honest-majority setting. Among privacy-preserving data mining techniques, significant attention has been focused on the classification problem. Logistic regression emerges as a well-established classification model, renowned for its impressive performance. We introduce a novel matrix encryption method to build a maliciously secure logistic model. Our scheme involves only a single semi-honest server and is resilient to malicious data providers that may deviate arbitrarily from the scheme. The d-transformation ensures that our scheme achieves indistinguishability (i.e., no adversary can determine, in polynomial time, which of the plaintexts corresponds to a given ciphertext in a chosen-plaintext attack). Malicious activities of data providers can be detected in the verification stage. A lossy compression method is implemented to minimize communication costs while preserving negligible degradation in accuracy. Experiments illustrate that our scheme is highly efficient to analyze large-scale datasets and achieves accuracy similar to non-private models. The proposed scheme outperforms other maliciously secure frameworks in terms of computation and communication costs.
引用
收藏
页码:5751 / 5766
页数:16
相关论文
共 50 条
  • [1] Efficient Privacy-Preserving Data Mining in Malicious Model
    Emura, Keita
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    [J]. ADVANCED DATA MINING AND APPLICATIONS, ADMA 2010, PT I, 2010, 6440 : 370 - 382
  • [2] Privacy-preserving data mining in the malicious model
    Kantarcioglu, Murat
    Kardes, Onur
    [J]. International Journal of Information and Computer Security, 2008, 2 (04) : 353 - 375
  • [3] Efficient Security Solution for Privacy-Preserving Cloud Services
    Malina, Lukas
    Hajny, Jan
    [J]. 2013 36TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2013, : 23 - 27
  • [4] Privacy-preserving logistic regression training
    Charlotte Bonte
    Frederik Vercauteren
    [J]. BMC Medical Genomics, 11
  • [5] Privacy-preserving logistic regression training
    Bonte, Charlotte
    Vercauteren, Frederik
    [J]. BMC MEDICAL GENOMICS, 2018, 11
  • [6] Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model
    Neugebauer, Georg
    Brutschy, Lucas
    Meyer, Ulrike
    Wetzel, Susanne
    [J]. DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, DPM 2013, 2014, 8247 : 178 - 193
  • [7] VFLR: An Efficient and Privacy-Preserving Vertical Federated Framework for Logistic Regression
    Zhao, Jiaqi
    Zhu, Hui
    Wang, Fengwei
    Lu, Rongxing
    Wang, Ermei
    Li, Linfeng
    Li, Hui
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (04) : 3326 - 3340
  • [8] PEVLR: A New Privacy-Preserving and Efficient Approach for Vertical Logistic Regression
    Mao, Sihan
    Zheng, Xiaolin
    Zhang, Jianguang
    Hu, Xiaodong
    [J]. NEURAL INFORMATION PROCESSING, ICONIP 2023, PT IV, 2024, 14450 : 380 - 392
  • [9] PVOPM: Verifiable Privacy-Preserving Pattern Matching with Efficient Outsourcing in the Malicious Setting
    Zhou, Jun
    Choo, Kim-Kwang Raymond
    Cao, Zhenfu
    Dong, Xiaolei
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (05) : 2253 - 2270
  • [10] An Efficient Privacy-Preserving Scheme for Wireless Link Layer Security
    Fan, Yanfei
    Lin, Bin
    Jiang, Yixin
    Shen, Xuemin
    [J]. GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,