Secure and Privacy-Preserving Decision Tree Classification with Lower Complexity
查看参考文献29篇
文摘
|
As a widely-used machine-learning classifier, a decision tree model can be trained and deployed at a service provider to provide classification services for clients, e.g., remote diagnostics. To address privacy concerns regarding the sensitive information in these services (i.e., the clients' inputs, model parameters, and classification results), we propose a privacy-preserving decision tree classification scheme (PDTC) in this paper. Specifically, we first tailor an additively homomorphic encryption primitive and a secret sharing technique to design a new secure two-party comparison protocol, where the numeric inputs of each party can be privately compared as a whole instead of doing that in a bit-by-bit manner. Then, based on the comparison protocol, we exploit the structure of the decision tree to construct PDTC, where the input of a client and the model parameters of a service provider are concealed from the counterparty and the classification result is only revealed to the client. A formal simulation-based security model and the security proof demonstrate that PDTC achieves desirable security properties. In addition, performance evaluation shows that PDTC achieves a lower communication and computation overhead compared with existing schemes. |
来源
|
Journal of Communications and Information Networks
,2020,5(1):16-25 【核心库】
|
DOI
|
10.23919/JCIN.2020.9055107
|
关键词
|
decision trees
;
data privacy
;
model privacy
;
secure comparison
;
machine-learning classification
|
地址
|
1.
Department of Electrical and Computer Engineering, University of Waterloo, Canada, Waterloo, N2L 3G1
2.
School of Computer Science, University of Guelph, Canada, Guelph, N1G2W1
|
语种
|
英文 |
文献类型
|
研究性论文 |
ISSN
|
2096-1081 |
学科
|
电子技术、通信技术 |
文献收藏号
|
CSCD:6681623
|
参考文献 共
29
共2页
|
1.
Wan N. Machine learning enables detection of early-stage colorectal cancer by whole-genome sequencing of plasma cell-free DNA.
BMC Cancer,2019,19(1):832
|
被引
2
次
|
|
|
|
2.
Kumar S. A machine learning based web spam filtering approach.
2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA),2016:973-980
|
被引
1
次
|
|
|
|
3.
Liang J. Efficient and secure decision tree classification for cloud-assisted online diagnosis services.
IEEE Transactions on Dependable and Secure Computing,2019
|
被引
1
次
|
|
|
|
4.
Huang C. Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases.
Journal of Computer and System Sciences,2017,89:51-63
|
被引
1
次
|
|
|
|
5.
Fredrikson M. Model inversion attacks that exploit confidence information and basic countermeasures.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security,2015:1322-1333
|
被引
32
次
|
|
|
|
6.
Tramer F. Stealing machine learning models via prediction APIs.
25th USENIX Security Symposium,2016:601-618
|
被引
2
次
|
|
|
|
7.
Huang C. Secure automated valet parking: A privacy-preserving reservation scheme for autonomous vehicles.
IEEE Transactions on Vehicular Technology,2018,67(11):11169-11180
|
被引
3
次
|
|
|
|
8.
Keller M. MASCOT: Faster malicious arithmetic secure computation with oblivious transfer.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security,2016:830-842
|
被引
1
次
|
|
|
|
9.
Damgard I. Multiparty computation from somewhat homomorphic encryption.
Annual Cryptology Conference,2012:643-662
|
被引
3
次
|
|
|
|
10.
Liu D. Anonymous reputation system for IIoT-enabled retail marketing atop PoS blockchain.
IEEE Transactions on Industrial Informatics,2019,15(6):3527-3537
|
被引
4
次
|
|
|
|
11.
Franz M. CBMC-GC: An ANSI C compiler for secure two-party computations.
International Conference on Compiler Construction,2014:244-249
|
被引
1
次
|
|
|
|
12.
Gentry C. Fully homomorphic encryption using ideal lattices.
Proceedings of the 41st Annual ACM Symposium on Theory of Computing,2009:169-178
|
被引
48
次
|
|
|
|
13.
Ni J. Enabling strong privacy preservation and accurate task allocation for mobile crowdsensing.
IEEE Transactions on Mobile Computing,2019
|
被引
1
次
|
|
|
|
14.
Liu C. Oblivm: A programming framework for secure computation.
2015 IEEE Symposium on Security and Privacy,2015:359-376
|
被引
4
次
|
|
|
|
15.
Wu D J. Privately evaluating decision trees and random forests.
Proceedings on Privacy Enhancing Technologies,2016,2016(4):335-355
|
被引
5
次
|
|
|
|
16.
Tai R K H. Privacy-preserving decision trees evaluation via linear functions.
European Symposium on Research in Computer Security,2017:494-512
|
被引
1
次
|
|
|
|
17.
Brickell J. Privacypreserving remote diagnostics.
Proceedings of the 14th ACM conference on Computer and communications security,2007:498-507
|
被引
2
次
|
|
|
|
18.
Bost R. Machine learning classification over encrypted data.
NDSS,2015:4324-4325
|
被引
1
次
|
|
|
|
19.
Damgard I. Efficient and secure comparison for on-line auctions.
Australasian Conference on Information Security and Privacy,2007:416-430
|
被引
2
次
|
|
|
|
20.
Tueno A. Private evaluation of decision trees using sublinear cost.
Proceedings on Privacy Enhancing Technologies,2019,2019(1):266-286
|
被引
2
次
|
|
|
|
|