Privacy-preserving LOF outlier detection

被引:15
|
作者
Li, Lu [1 ,2 ]
Huang, Liusheng [1 ,2 ]
Yang, Wei [1 ,2 ]
Yao, Xiaohui [1 ]
Liu, An [1 ,2 ]
机构
[1] Univ Sci & Technol China, Sch Comp Sci & Technol, Hefei 230026, Peoples R China
[2] Univ Sci & Technol China, Suzhou Inst Adv Study, Suzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy-preserving; LOF; Data mining; k-NN query; 2-PARTY COMPUTATION;
D O I
10.1007/s10115-013-0692-0
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
LOF is a well-known approach for density-based outlier detection and has received much attention recently. It is important to design a privacy-preserving LOF outlier detection algorithm as the data on which LOF runs is typically spilt among multiple participants and no one is willing to disclose his sensitive information due to legal or moral considerations. This is, however, a hard problem since participants need to find the maximum one of the distances between an object and its k-Nearest Neighbors (k-NN) without learning the information of these objects. In this paper, we propose an efficient protocol for privacy-preserving LOF outlier detection. We first employ a shuffle protocol to permute the distance vectors owned by different participants. Then, we design a secure selection method to obtain the garbled k-NN indexes and shares of k-distance for given objects. For each object, we make use of the k-distance of all objects to construct a vector, based on which the permute protocol is executed again to obtain new shares of k-distance. Finally, the shares corresponding to the garbled k-NN indexes are selected as the expected result. Our protocol ensures that all the intermediates are shared between multiple participants and thus avoid information leaking. In addition, our protocol is efficient as we prove that the computation and communication complexity of our protocol is bounded by .
引用
收藏
页码:579 / 597
页数:19
相关论文
共 50 条
  • [1] Privacy-preserving LOF outlier detection
    Lu Li
    Liusheng Huang
    Wei Yang
    Xiaohui Yao
    An Liu
    [J]. Knowledge and Information Systems, 2015, 42 : 579 - 597
  • [2] Privacy-preserving outlier detection
    Vaidya, J
    Clifton, C
    [J]. FOURTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2004, : 233 - 240
  • [3] Privacy-Preserving Outlier Detection for Data Streams
    Boehler, Jonas
    Bernau, Daniel
    Kerschbaum, Florian
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXI, DBSEC 2017, 2017, 10359 : 225 - 238
  • [4] Efficient distributed privacy-preserving collaborative outlier detection
    Zhaohui Wei
    Qingqi Pei
    Xuefeng Liu
    Lichuan Ma
    [J]. Peer-to-Peer Networking and Applications, 2020, 13 : 2260 - 2271
  • [5] Efficient distributed privacy-preserving collaborative outlier detection
    Wei, Zhaohui
    Pei, Qingqi
    Liu, Xuefeng
    Ma, Lichuan
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (06) : 2260 - 2271
  • [6] PRIVACY-PRESERVING OUTLIER DETECTION OVER ARBITRARILY PARTITIONED DATA
    Li, Lu
    Huang, Liusheng
    Yang, Wei
    [J]. 3RD INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE (IEEC 2011), PROCEEDINGS, 2011, : 103 - 106
  • [7] Privacy-preserving Truth Discovery with Outlier Detection in Mobile Crowdsensing Systems
    Zhao, Jingchen
    Zhu, Bin
    Li, Jian
    Yuan, Shaoxian
    Xue, Kaiping
    Zhang, Xianchao
    [J]. 2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 4352 - 4357
  • [8] Privacy-Preserving Outlier Detection with High Efficiency over Distributed Datasets
    Lu, Guanghong
    Duan, Chunhui
    Zhou, Guohao
    Ding, Xuan
    Liu, Yunhao
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2021), 2021,
  • [9] Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion
    Bhaduri, Kanishka
    Stefanski, Mark D.
    Srivastava, Ashok N.
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2011, 41 (01): : 260 - 272
  • [10] Outlier Detection by Privacy-Preserving Ensemble Decision Tree Using Homomorphic Encryption
    Itokazu, Kengo
    Wang, Lihua
    Ozawa, Seiichi
    [J]. 2021 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2021,