Privacy-Preserving Decision Trees Training and Prediction

被引:4
|
作者
Akavia, Adi [1 ]
Leibovich, Max [1 ]
Resheff, Yehezkel S. [2 ]
Ron, Roey [2 ]
Shahar, Moni [3 ]
Vald, Margarita [2 ,4 ]
机构
[1] Univ Haifa, Haifa, Israel
[2] Intuit Inc, Petah Tiqwa, Israel
[3] Facebook Inc, Tel Aviv, Israel
[4] Tel Aviv Univ, Tel Aviv, Israel
基金
以色列科学基金会;
关键词
Fully homomorphic encryption; Privacy preserving machine learning; Decision trees; Training; Prediction;
D O I
10.1007/978-3-030-67658-2_9
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the era of cloud computing and machine learning, data has become a highly valuable resource. Recent history has shown that the benefits brought forth by this data driven culture come at a cost of potential data leakage. Such breaches have a devastating impact on individuals and industry, and lead the community to seek privacy preserving solutions. A promising approach is to utilize Fully Homomorphic Encryption (FHE) to enable machine learning over encrypted data, thus providing resiliency against information leakage. However, computing over encrypted data incurs a high computational overhead, thus requiring the redesign of algorithms, in an "FHE-friendly" manner, to maintain their practicality. In this work we focus on the ever-popular tree based methods (e.g., boosting, random forests), and propose a new privacy-preserving solution to training and prediction for trees. Our solution employs a low-degree approximation for the step-function together with a lightweight interactive protocol, to replace components of the vanilla algorithm that are costly over encrypted data. Our protocols for decision trees achieve practical usability demonstrated on standard UCI datasets, encrypted with fully homomorphic encryption. In addition, the communication complexity of our protocols is independent of the tree size and dataset size in prediction and training, respectively, which significantly improves on prior works.
引用
收藏
页码:145 / 161
页数:17
相关论文
共 50 条
  • [1] Privacy-Preserving Decision Trees Training and Prediction
    Akavia, Adi
    Leibovich, Max
    Resheff, Yehezkel S.
    Ron, Roey
    Shahar, Moni
    Vald, Margarita
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (03)
  • [2] PrivaTree: Collaborative Privacy-Preserving Training of Decision Trees on Biomedical Data
    El Zein, Yamane
    Lemay, Mathieu
    Huguenin, Kevin
    [J]. IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, 2024, 21 (01) : 1 - 13
  • [3] Privacy-Preserving Gradient Boosting Decision Trees
    Li, Qinbin
    Wu, Zhaomin
    Wen, Zeyi
    He, Bingsheng
    [J]. THIRTY-FOURTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THE THIRTY-SECOND INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE AND THE TENTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2020, 34 : 784 - 791
  • [4] Privacy-Preserving Inductive Learning with Decision Trees
    Truex, Stacey
    Liu, Ling
    Gursoy, Mehmet Emre
    Yu, Lei
    [J]. 2017 IEEE 6TH INTERNATIONAL CONGRESS ON BIG DATA (BIGDATA CONGRESS 2017), 2017, : 57 - 64
  • [5] Lightweight Privacy-Preserving Federated Incremental Decision Trees
    Han, Zhaoyang
    Ge, Chunpeng
    Wu, Bingzhe
    Liu, Zhe
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (03) : 1964 - 1975
  • [6] Privacy-preserving decision trees over vertically partitioned data
    Vaidya, J
    Clifton, C
    [J]. DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 139 - 152
  • [7] Privacy-Preserving Decision Trees Evaluation via Linear Functions
    Tai, Raymond K. H.
    Ma, Jack P. K.
    Zhao, Yongjun
    Chow, Sherman S. M.
    [J]. COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 : 494 - 512
  • [8] Privacy-Preserving Mining of Decision Trees Using Data Negation Approach
    Dhandhania, R. K.
    Baruah, P. K.
    Mukkamala, R.
    [J]. 2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 43 - 48
  • [9] Privacy-preserving authentication of trees and graphs
    Ashish Kundu
    Elisa Bertino
    [J]. International Journal of Information Security, 2013, 12 : 467 - 494
  • [10] Privacy-preserving authentication of trees and graphs
    Kundu, Ashish
    Bertino, Elisa
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (06) : 467 - 494