Privacy-Preserving Delegation of Decision Tree Classification

被引:0
|
作者
Chang, Che-Chia [1 ]
Lin, Jian-Feng [1 ]
Hsu, Song-Yi [1 ]
Chen, Yu-Chi [1 ]
机构
[1] Yuan Ze Univ, Dept Comp Sci & Engn, Taoyuan, Taiwan
关键词
Privacy-preserving delegation; decision tree classification; secret sharing; security;
D O I
10.1109/icce-taiwan49838.2020.9258197
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the era of cloud computing with security, how to outsource a trained model to the server but preserve the model privacy is a significant problem for decision tree classification (DTC). In this paper, we aim for constructing an interactive system to realize privacy-preserving delegation for DTC. We focus on a basic structure of DTC, and believe that it can be generalization. The main technique to preserve privacy is to build secret sharing-based protocols for the model owner, user, and server. However, to overcome communication issues between the model owner and user, we achieve compression by using pseudorandom generators.
引用
下载
收藏
页数:2
相关论文
共 50 条
  • [1] Efficient privacy-preserving decision tree classification protocol
    Ma L.
    Peng J.
    Pei Q.
    Zhu H.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (08): : 80 - 89
  • [2] Using homomorphic encryption for privacy-preserving collaborative decision tree classification
    Zhan, Justin
    2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 637 - 645
  • [3] Efficient and Privacy-Preserving Decision Tree Classification for Health Monitoring Systems
    Liang, Jinwen
    Qin, Zheng
    Xue, Liang
    Lin, Xiaodong
    Shen, Xuemin
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (16) : 12528 - 12539
  • [4] Privacy-preserving decision tree for epistasis detection
    Chen, Qingfeng
    Zhang, Xu
    Zhang, Ruchang
    CYBERSECURITY, 2019, 2 (01)
  • [5] Privacy-preserving decision tree for epistasis detection
    Qingfeng Chen
    Xu Zhang
    Ruchang Zhang
    Cybersecurity, 2
  • [6] Digital credentials with privacy-preserving delegation
    Knox, D. A.
    Adams, C.
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (08) : 825 - 838
  • [7] Privacy-preserving decision tree mining based on random substitutions
    Dowd, Jim
    Xu, Shouhuai
    Zhang, Weining
    EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 145 - 159
  • [8] Decision-tree model research based on privacy-preserving
    Fang, Wei-Wei
    Yang, Bing-Ru
    Yang, Jun
    Zhou, Chang-Sheng
    Moshi Shibie yu Rengong Zhineng/Pattern Recognition and Artificial Intelligence, 2010, 23 (06): : 766 - 771
  • [9] Privacy-Preserving Decision Tree Learning with Boolean Target Class
    Kikuchi, Hiroaki
    Itoh, Kouichi
    Ushida, Mebae
    Tsuda, Hiroshi
    Yamaoka, Yuji
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (11) : 2291 - 2300
  • [10] A Random Decision Tree Framework for Privacy-Preserving Data Mining
    Vaidya, Jaideep
    Shafiq, Basit
    Fan, Wei
    Mehmood, Danish
    Lorenzi, David
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (05) : 399 - 411