Efficient Privacy-Preserving Data Mining in Malicious Model

被引:0
|
作者
Emura, Keita [1 ]
Miyaji, Atsuko [1 ]
Rahman, Mohammad Shahriar [1 ]
机构
[1] Japan Adv Inst Sci & Technol, Ctr Highly Dependable Embedded Syst Technol, Nomi, Ishikawa 9231292, Japan
关键词
Privacy-preserving Data Mining; Malicious Model; Threshold Two-party Computation; Efficiency; PUBLIC-KEY ENCRYPTION; COMPUTATION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In many distributed data mining settings, disclosure of the original data sets is not acceptable due to privacy concerns. To address such concerns, privacy-preserving data mining has been an active research area in recent years. While confidentiality is a key issue, scalability is also an important aspect to assess the performance of a privacy-preserving data mining algorithms for practical applications. With this in mind, Kantarcioglu et al. proposed secure dot product and secure set-intersection protocols for privacy-preserving data mining in malicious adversarial model using zero knowledge proofs, since the assumption of semi-honest adversary is unrealistic in some settings. Both the computation and communication complexities are linear with the number of data items in the protocols proposed by Kantarcioglu et al. In this paper, we build efficient and secure dot product and set-intersection protocols in malicious model. In our work, the complexity of computation and communication for proof of knowledge is always constant (independent of the number of data items), while the complexity of computation and communication for the encrypted messages remains the same as in Kantarcioglu et al.'s work (linear with the number of data items). Furthermore, we provide the security model in Universal Composability framework.
引用
收藏
页码:370 / 382
页数:13
相关论文
共 50 条
  • [31] Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid
    Wang, Jing
    Wu, Libing
    Zeadally, Sherali
    Khan, Muhammad Khurram
    He, Debiao
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2021, 17 (03)
  • [32] Efficient and Privacy-Preserving k-means clustering For Big Data Mining
    Gheid, Zakaria
    Challal, Yacine
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 791 - 798
  • [33] Two methods for privacy preserving data mining with malicious participants
    Shah, Divyesh
    Zhong, Sheng
    [J]. INFORMATION SCIENCES, 2007, 177 (23) : 5468 - 5483
  • [34] An efficient privacy-preserving approach for data publishing
    Xinyu Qian
    Xinning Li
    Zhiping Zhou
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 : 2077 - 2093
  • [35] An efficient privacy-preserving approach for data publishing
    Qian, Xinyu
    Li, Xinning
    Zhou, Zhiping
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 14 (3) : 2077 - 2093
  • [36] Recent Developments in Privacy-preserving Mining of Clinical Data
    Desmet, Chance
    Cook, Diane J.
    [J]. ACM/IMS Transactions on Data Science, 2021, 2 (04):
  • [37] Comparative Analysis of Privacy-Preserving Data Mining Techniques
    Bhandari, Neetika
    Pahwa, Payal
    [J]. INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 2, 2019, 56 : 535 - 541
  • [38] A New Scheme to Privacy-Preserving Collaborative Data Mining
    Zhu, Jianming
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 468 - 471
  • [39] Privacy-Preserving Data Mining: Methods, Metrics, and Applications
    Mendes, Ricardo
    Vilela, Joao P.
    [J]. IEEE ACCESS, 2017, 5 : 10562 - 10582
  • [40] Approximate Privacy-Preserving Data Mining on Vertically Partitioned Data
    Nix, Robert
    Kantarcioglu, Murat
    Han, Keesook J.
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 129 - 144