Privacy-Preserving Delegation of Decision Tree Classification

被引:0
|
作者
Chang, Che-Chia [1 ]
Lin, Jian-Feng [1 ]
Hsu, Song-Yi [1 ]
Chen, Yu-Chi [1 ]
机构
[1] Yuan Ze Univ, Dept Comp Sci & Engn, Taoyuan, Taiwan
关键词
Privacy-preserving delegation; decision tree classification; secret sharing; security;
D O I
10.1109/icce-taiwan49838.2020.9258197
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the era of cloud computing with security, how to outsource a trained model to the server but preserve the model privacy is a significant problem for decision tree classification (DTC). In this paper, we aim for constructing an interactive system to realize privacy-preserving delegation for DTC. We focus on a basic structure of DTC, and believe that it can be generalization. The main technique to preserve privacy is to build secret sharing-based protocols for the model owner, user, and server. However, to overcome communication issues between the model owner and user, we achieve compression by using pseudorandom generators.
引用
收藏
页数:2
相关论文
共 50 条
  • [1] Efficient privacy-preserving decision tree classification protocol
    Ma L.
    Peng J.
    Pei Q.
    Zhu H.
    [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (08): : 80 - 89
  • [2] Using homomorphic encryption for privacy-preserving collaborative decision tree classification
    Zhan, Justin
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 637 - 645
  • [3] Efficient and Privacy-Preserving Decision Tree Classification for Health Monitoring Systems
    Liang, Jinwen
    Qin, Zheng
    Xue, Liang
    Lin, Xiaodong
    Shen, Xuemin
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (16) : 12528 - 12539
  • [4] Privacy-preserving decision tree for epistasis detection
    Chen, Qingfeng
    Zhang, Xu
    Zhang, Ruchang
    [J]. CYBERSECURITY, 2019, 2 (01)
  • [5] Privacy-preserving decision tree for epistasis detection
    Qingfeng Chen
    Xu Zhang
    Ruchang Zhang
    [J]. Cybersecurity, 2
  • [6] Digital credentials with privacy-preserving delegation
    Knox, D. A.
    Adams, C.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (08) : 825 - 838
  • [7] Privacy-preserving decision tree mining based on random substitutions
    Dowd, Jim
    Xu, Shouhuai
    Zhang, Weining
    [J]. EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 145 - 159
  • [8] Decision-tree model research based on privacy-preserving
    Fang, Wei-Wei
    Yang, Bing-Ru
    Yang, Jun
    Zhou, Chang-Sheng
    [J]. Moshi Shibie yu Rengong Zhineng/Pattern Recognition and Artificial Intelligence, 2010, 23 (06): : 766 - 771
  • [9] Privacy-Preserving Decision Tree Learning with Boolean Target Class
    Kikuchi, Hiroaki
    Itoh, Kouichi
    Ushida, Mebae
    Tsuda, Hiroshi
    Yamaoka, Yuji
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (11) : 2291 - 2300
  • [10] A Random Decision Tree Framework for Privacy-Preserving Data Mining
    Vaidya, Jaideep
    Shafiq, Basit
    Fan, Wei
    Mehmood, Danish
    Lorenzi, David
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (05) : 399 - 411