Privacy preserving distributed data mining based on secure multi-party computation

被引:33
|
作者
Liu, Jun [1 ]
Tian, Yuan [1 ]
Zhou, Yu [1 ]
Xiao, Yang [1 ]
Ansari, Nirwan [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Ctr Data Sci, Beijing, Peoples R China
[2] New Jersey Inst Technol, Elect & Comp Engn Dept, Adv Networking Lab, Newark, NJ 07102 USA
关键词
Secure data mining; Multi-party computation; SPDZ protocol; Secret sharing; Matrix optimization; Privacy preserving computing;
D O I
10.1016/j.comcom.2020.02.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data mining is an important task to understand the valuable information for making correct decisions. Technologies for mining self-owned data of a party are rather mature. However, how to perform distributed data mining to obtain information from data owned by multiple parties without privacy leakage remains a big challenge. While secure multi-party computation (MPC) may potentially address this challenge, several issues have to be overcome for practical realizations. In this paper, we point out two unsupported tasks of MPC that are common in the real-world. Towards this end, we design algorithms based on optimized matrix computation with one-hot encoding and LU decomposition to support these requirements in the MPC context. In addition, we implement them based on a SPDZ protocol, a computation framework of MPC. The experimental evaluation results show that our design and implementation are feasible and effective for privacy preserving distributed data mining.
引用
收藏
页码:208 / 216
页数:9
相关论文
共 50 条
  • [1] Privacy preserving sequential pattern mining based on secure multi-party computation
    Ouyang, Weimin
    Huang, Qinhua
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON INFORMATION ACQUISITION, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2006, : 149 - 154
  • [2] Secure Multi-party Protocols for Privacy Preserving Data Mining
    Ma, Qingkai
    Deng, Ping
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2008, 5258 : 526 - 537
  • [3] Privacy-Preserving Secure Computation of Skyline Query in Distributed Multi-Party Databases †
    Qaosar, Mahboob
    Zaman, Asif
    Siddique, Md. Anisuzzaman
    Annisa
    Morimoto, Yasuhiko
    [J]. INFORMATION, 2019, 10 (03):
  • [4] Secure Multi-party Computation Based Privacy Preserving Extreme Learning Machine Algorithm Over Vertically Distributed Data
    Catak, Ferhat Ozgur
    [J]. NEURAL INFORMATION PROCESSING, PT II, 2015, 9490 : 337 - 345
  • [5] Privacy preserving E-negotiation protocols based on secure multi-party computation
    Chakraborty, S
    Sehgal, SK
    Pal, AK
    [J]. PROCEEDINGS OF THE IEEE SOUTHEASTCON 2004: EXCELLENCE IN ENGINEERING, SCIENCE, AND TECHNOLOGY, 2005, : 455 - 461
  • [6] Privacy-preserving SVM on Outsourced Genomic Data via Secure Multi-party Computation
    Chen, Huajie
    Uenal, Ali Burak
    Akguen, Mete
    Pfeifer, Nico
    [J]. PROCEEDINGS OF THE SIXTH INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS (IWSPA'20), 2020, : 61 - 69
  • [7] Secure Multi-Party Computation-Based Privacy-Preserving Authentication for Smart Cities
    Sucasas, Victor
    Aly, Abdelrahaman
    Mantas, Georgios
    Rodriguez, Jonathan
    Aaraj, Najwa
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (04) : 3555 - 3572
  • [8] Multi-party, privacy-preserving distributed data mining using a game theoretic framework
    Kargupta, Hillol
    Das, Kamalika
    Liu, Kun
    [J]. KNOWLEDGE DISCOVERY IN DATABASES: PKDD 2007, PROCEEDINGS, 2007, 4702 : 523 - +
  • [9] Privacy sensitive distributed data mining from multi-party data
    Kargupta, H
    Liu, K
    Ryan, J
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2003, 2665 : 336 - 342
  • [10] Privacy-Preserving Data Communication Through Secure Multi-Party Computation in Healthcare Sensor Cloud
    Raylin Tso
    Abdulhameed Alelaiwi
    Sk Md Mizanur Rahman
    Mu-En Wu
    M. Shamim Hossain
    [J]. Journal of Signal Processing Systems, 2017, 89 : 51 - 59