Efficient Privacy Preserving Cross-Datasets Collaborative Outlier Detection

被引:1
|
作者
Wei, Zhaohui [1 ]
Pei, Qingqi [1 ]
Liu, Xuefeng [2 ]
Ma, Lichuan [2 ]
机构
[1] Xidian Univ, Sch Telecommun Engn, Xian 710071, Shaanxi, Peoples R China
[2] Xidian Univ, Sch Cyber Engn, Xian, Shaanxi, Peoples R China
来源
关键词
Privacy-preserving; Outlier detection; Distributed data;
D O I
10.1007/978-3-030-37352-8_31
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Outlier detection is one of the most important data analytics tasks and is used in numerous applications and domains. It is the identification of rare items, events or observations which raise suspicions by differing significantly from the majority of the data. The accuracy of the outlier detection depends on sufficient data. However, the underlying data is distributed across different organizations. If outlier detection is done locally, the results obtained are not as accurate as when outlier detection is done collaboratively over the combined data. Unfortunately, competitive advantage, privacy concerns and regulations, and issues surrounding data sovereignty and jurisdiction prevent many organizations from openly sharing their data. In this paper, we address precisely this issue. We present new and efficient protocols for privacy preserving outlier detection to find outliers from arbitrarily partitioned categorical data. Our protocols fall in the two-server model where data owners distribute their private data among two non-colluding servers who detects on the joint data using secure two-party computation (2PC). Our method is based on Local Distance-based Outlier Factor (LDOF) using the relative location of an object to its neighbours to determine the degree to which the object deviates from its neighbourhood. We provide the privacy guarantee by using secure multiparty computation techniques. We implement our system in C++ on real data. Our experiments validate that our protocols are both effective and efficient.
引用
收藏
页码:343 / 356
页数:14
相关论文
共 50 条
  • [1] Efficient distributed privacy-preserving collaborative outlier detection
    Wei, Zhaohui
    Pei, Qingqi
    Liu, Xuefeng
    Ma, Lichuan
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (06) : 2260 - 2271
  • [2] Efficient distributed privacy-preserving collaborative outlier detection
    Zhaohui Wei
    Qingqi Pei
    Xuefeng Liu
    Lichuan Ma
    [J]. Peer-to-Peer Networking and Applications, 2020, 13 : 2260 - 2271
  • [3] Privacy-Preserving Outlier Detection with High Efficiency over Distributed Datasets
    Lu, Guanghong
    Duan, Chunhui
    Zhou, Guohao
    Ding, Xuan
    Liu, Yunhao
    [J]. IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2021), 2021,
  • [4] Privacy Preserving Spatial Outlier Detection
    Xue, Anrong
    Duan, Xiqiang
    Ma, Handa
    Chen, Weihe
    Ju, Shiguang
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 714 - 719
  • [5] Privacy-preserving outlier detection
    Vaidya, J
    Clifton, C
    [J]. FOURTH IEEE INTERNATIONAL CONFERENCE ON DATA MINING, PROCEEDINGS, 2004, : 233 - 240
  • [6] Federated CF: Privacy-Preserving Collaborative Filtering Cross Multiple Datasets
    Wang, Le
    Huang, Zijun
    Pei, Qingqi
    Wang, Shen
    [J]. ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [7] Privacy-preserving LOF outlier detection
    Lu Li
    Liusheng Huang
    Wei Yang
    Xiaohui Yao
    An Liu
    [J]. Knowledge and Information Systems, 2015, 42 : 579 - 597
  • [8] Privacy-preserving LOF outlier detection
    Li, Lu
    Huang, Liusheng
    Yang, Wei
    Yao, Xiaohui
    Liu, An
    [J]. KNOWLEDGE AND INFORMATION SYSTEMS, 2015, 42 (03) : 579 - 597
  • [9] Privacy-Preserving Outlier Detection for Data Streams
    Boehler, Jonas
    Bernau, Daniel
    Kerschbaum, Florian
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXI, DBSEC 2017, 2017, 10359 : 225 - 238
  • [10] Privacy preserving outlier detection in social networking services
    Yao, Yifei
    Zheng, Rong
    Shang, Weichang
    [J]. Journal of Computational Information Systems, 2013, 9 (11): : 4299 - 4307