IDPriU: A two-party ID-private data union protocol for privacy-preserving machine learning

被引:0
|
作者
Yan, Jianping [1 ]
Wei, Lifei [1 ]
Qian, Xiansong [2 ]
Zhang, Lei [2 ]
机构
[1] Shanghai Maritime Univ, Coll Informat Engn, Shanghai 201306, Peoples R China
[2] Shanghai Ocean Univ, Coll Informat Technol, Shanghai 201306, Peoples R China
基金
上海市自然科学基金;
关键词
Private data union; Privacy-preserving machine learning; Data security; Data preprocessing; Private set union;
D O I
10.1016/j.jisa.2024.103913
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to significant data security concerns in machine learning, such as the data silo problem, there has been a growing trend towards the development of privacy-preserving machine learning applications. The initial step in training data across silos involves establishing secure data joins, specifically private data joins, to ensure the consistency and accuracy of the dataset. While the majority of current research focuses on the inner join of private data, this paper specifically addresses the privacy-preserving full join of private data and develops two-party unbalanced private data full join protocols utilizing secure multi-party computation tools. Notably, our paper introduces the novel component of Private Match-and-Connect (PMC), which performs a union operation on the ID and feature values, and ensure the secret sharing of the resulting union set. Each participant receives only a portion of the secret share, thereby guaranteeing data security during the pre-processing phase. Furthermore, we propose the two-party ID-private data union protocol (IDPriU), which facilitates secure and accurate matching of feature value shares and ID shares and also enables the data alignment. Our protocol represents a significant advancement in the field of privacy-preserving data preprocessing in machine learning and privacy-preserving federated queries. It extends the concept that private data joins are limited to inner connections, offering a novel approach by Private Set Union (PSU). We have experimentally implemented our protocol and obtained favorable results in terms of both runtime and communication overhead.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] iPrivJoin: An ID-Private Data Join Framework for Privacy-Preserving Machine Learning
    Liu, Yang
    Zhang, Bingsheng
    Ma, Yuxiang
    Ma, Zhuo
    Wu, Zecheng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4300 - 4312
  • [2] Privacy-preserving Two-party Rational Set Intersection Protocol
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2012, 36 (03): : 277 - 286
  • [3] Privacy-preserving two-party rational set intersection protocol
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    Informatica (Slovenia), 2012, 36 (03): : 277 - 286
  • [4] Strong Privacy-preserving Two-party Scalar Product Quantum Protocol
    Run-hua Shi
    Mingwu Zhang
    International Journal of Theoretical Physics, 2019, 58 : 4249 - 4257
  • [5] A Novel Privacy-Preserving Two-Party Vector Dominance Statistic Protocol
    Liu, Jie
    Long, Xiaoli
    Chen, Changpin
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 124 : 195 - 196
  • [6] Strong Privacy-preserving Two-party Scalar Product Quantum Protocol
    Shi, Run-hua
    Zhang, Mingwu
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (12) : 4249 - 4257
  • [7] Consensus Control Based on Privacy-Preserving Two-Party Relationship Test Protocol
    Wang, Hanzhou
    Li, Dongyu
    Guan, Zhenyu
    Liu, Yizhong
    Liu, Jianwei
    IEEE CONTROL SYSTEMS LETTERS, 2023, 7 : 2185 - 2190
  • [8] TPOT: a Two-party Privacy-preserving Ownership Transfer Protocol for RFID Tags
    Yin, Xi
    An, Zhulin
    Xu, Yongjun
    Long, Hua
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [9] A Secure Two-Party Bartering Protocol Using Privacy-Preserving Interval Operations
    Foerg, Fabian
    Mayer, Daniel
    Wetzel, Susanne
    Wueller, Stefan
    Meyer, Ulrike
    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 57 - 66
  • [10] Two-party privacy-preserving agglomerative document clustering
    Su, Chunhua
    Zhou, Jianying
    Bao, Feng
    Takagi, Tsuyoshi
    Sakurai, Kouichi
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 193 - +