Privacy-preserving LOF outlier detection

被引:15
|
作者
Li, Lu [1 ,2 ]
Huang, Liusheng [1 ,2 ]
Yang, Wei [1 ,2 ]
Yao, Xiaohui [1 ]
Liu, An [1 ,2 ]
机构
[1] Univ Sci & Technol China, Sch Comp Sci & Technol, Hefei 230026, Peoples R China
[2] Univ Sci & Technol China, Suzhou Inst Adv Study, Suzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy-preserving; LOF; Data mining; k-NN query; 2-PARTY COMPUTATION;
D O I
10.1007/s10115-013-0692-0
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
LOF is a well-known approach for density-based outlier detection and has received much attention recently. It is important to design a privacy-preserving LOF outlier detection algorithm as the data on which LOF runs is typically spilt among multiple participants and no one is willing to disclose his sensitive information due to legal or moral considerations. This is, however, a hard problem since participants need to find the maximum one of the distances between an object and its k-Nearest Neighbors (k-NN) without learning the information of these objects. In this paper, we propose an efficient protocol for privacy-preserving LOF outlier detection. We first employ a shuffle protocol to permute the distance vectors owned by different participants. Then, we design a secure selection method to obtain the garbled k-NN indexes and shares of k-distance for given objects. For each object, we make use of the k-distance of all objects to construct a vector, based on which the permute protocol is executed again to obtain new shares of k-distance. Finally, the shares corresponding to the garbled k-NN indexes are selected as the expected result. Our protocol ensures that all the intermediates are shared between multiple participants and thus avoid information leaking. In addition, our protocol is efficient as we prove that the computation and communication complexity of our protocol is bounded by .
引用
收藏
页码:579 / 597
页数:19
相关论文
共 50 条
  • [21] Privacy-preserving Services in VANET with Misbehavior Detection
    Parikh, Nandan
    Das, Manik Lal
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (ANTS), 2017,
  • [22] Privacy-preserving decision tree for epistasis detection
    Qingfeng Chen
    Xu Zhang
    Ruchang Zhang
    [J]. Cybersecurity, 2
  • [23] Privacy Leakage Vulnerability Detection for Privacy-Preserving Computation Services
    Zhang, Su
    Zhang, Ying
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (IEEE ICWS 2022), 2022, : 219 - 228
  • [24] Privacy-Preserving Emotion Detection for Crowd Management
    Erkin, Zeki
    Li, Jie
    Vermeeren, Arnold P. O. S.
    de Ridder, Huib
    [J]. ACTIVE MEDIA TECHNOLOGY, AMT 2014, 2014, 8610 : 359 - +
  • [25] Elxa: Scalable Privacy-Preserving Plagiarism Detection
    Unger, Nik
    Thandra, Sahithi
    Goldberg, Ian
    [J]. PROCEEDINGS OF THE 2016 ACM WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY (WPES'16), 2016, : 153 - 164
  • [26] Privacy-preserving collision detection of moving objects
    Dehghan, Motahareh
    Sadeghiyan, Babak
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2019, 30 (03)
  • [27] Privacy-Preserving Tampering Detection in Automotive Systems
    Roman, Adrian-Silviu
    Genge, Bela
    Duka, Adrian-Vasile
    Haller, Piroska
    [J]. ELECTRONICS, 2021, 10 (24)
  • [28] Efficient privacy-preserving similar document detection
    Murugesan, Mummoorthy
    Jiang, Wei
    Clifton, Chris
    Si, Luo
    Vaidya, Jaideep
    [J]. VLDB JOURNAL, 2010, 19 (04): : 457 - 475
  • [29] Privacy-Preserving Autoencoder for Collaborative Object Detection
    Azizian, Bardia
    Bajic, Ivan V.
    [J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2024, 33 : 4937 - 4951
  • [30] Development of privacy-preserving sensor for person detection
    Nakashima, Shota
    Kitazono, Yuhki
    Zhang, Lifeng
    Serikawa, Seiichi
    [J]. 1ST INTERNATIONAL CONFERENCE ON SECURITY CAMERA NETWORK, PRIVACY PROTECTION AND COMMUNITY SAFETY 2009, 2010, 2 (01): : 213 - 217