帮助 关于我们

返回检索结果

Secure and Privacy-Preserving Decision Tree Classification with Lower Complexity

查看参考文献29篇

文摘 As a widely-used machine-learning classifier, a decision tree model can be trained and deployed at a service provider to provide classification services for clients, e.g., remote diagnostics. To address privacy concerns regarding the sensitive information in these services (i.e., the clients' inputs, model parameters, and classification results), we propose a privacy-preserving decision tree classification scheme (PDTC) in this paper. Specifically, we first tailor an additively homomorphic encryption primitive and a secret sharing technique to design a new secure two-party comparison protocol, where the numeric inputs of each party can be privately compared as a whole instead of doing that in a bit-by-bit manner. Then, based on the comparison protocol, we exploit the structure of the decision tree to construct PDTC, where the input of a client and the model parameters of a service provider are concealed from the counterparty and the classification result is only revealed to the client. A formal simulation-based security model and the security proof demonstrate that PDTC achieves desirable security properties. In addition, performance evaluation shows that PDTC achieves a lower communication and computation overhead compared with existing schemes.
来源 Journal of Communications and Information Networks ,2020,5(1):16-25 【核心库】
DOI 10.23919/JCIN.2020.9055107
关键词 decision trees ; data privacy ; model privacy ; secure comparison ; machine-learning classification
地址

1. Department of Electrical and Computer Engineering, University of Waterloo, Canada, Waterloo, N2L 3G1  

2. School of Computer Science, University of Guelph, Canada, Guelph, N1G2W1

语种 英文
文献类型 研究性论文
ISSN 2096-1081
学科 电子技术、通信技术
文献收藏号 CSCD:6681623

参考文献 共 29 共2页

1.  Wan N. Machine learning enables detection of early-stage colorectal cancer by whole-genome sequencing of plasma cell-free DNA. BMC Cancer,2019,19(1):832 被引 2    
2.  Kumar S. A machine learning based web spam filtering approach. 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA),2016:973-980 被引 1    
3.  Liang J. Efficient and secure decision tree classification for cloud-assisted online diagnosis services. IEEE Transactions on Dependable and Secure Computing,2019 被引 1    
4.  Huang C. Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases. Journal of Computer and System Sciences,2017,89:51-63 被引 1    
5.  Fredrikson M. Model inversion attacks that exploit confidence information and basic countermeasures. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security,2015:1322-1333 被引 32    
6.  Tramer F. Stealing machine learning models via prediction APIs. 25th USENIX Security Symposium,2016:601-618 被引 2    
7.  Huang C. Secure automated valet parking: A privacy-preserving reservation scheme for autonomous vehicles. IEEE Transactions on Vehicular Technology,2018,67(11):11169-11180 被引 3    
8.  Keller M. MASCOT: Faster malicious arithmetic secure computation with oblivious transfer. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security,2016:830-842 被引 1    
9.  Damgard I. Multiparty computation from somewhat homomorphic encryption. Annual Cryptology Conference,2012:643-662 被引 3    
10.  Liu D. Anonymous reputation system for IIoT-enabled retail marketing atop PoS blockchain. IEEE Transactions on Industrial Informatics,2019,15(6):3527-3537 被引 4    
11.  Franz M. CBMC-GC: An ANSI C compiler for secure two-party computations. International Conference on Compiler Construction,2014:244-249 被引 1    
12.  Gentry C. Fully homomorphic encryption using ideal lattices. Proceedings of the 41st Annual ACM Symposium on Theory of Computing,2009:169-178 被引 48    
13.  Ni J. Enabling strong privacy preservation and accurate task allocation for mobile crowdsensing. IEEE Transactions on Mobile Computing,2019 被引 1    
14.  Liu C. Oblivm: A programming framework for secure computation. 2015 IEEE Symposium on Security and Privacy,2015:359-376 被引 4    
15.  Wu D J. Privately evaluating decision trees and random forests. Proceedings on Privacy Enhancing Technologies,2016,2016(4):335-355 被引 5    
16.  Tai R K H. Privacy-preserving decision trees evaluation via linear functions. European Symposium on Research in Computer Security,2017:494-512 被引 1    
17.  Brickell J. Privacypreserving remote diagnostics. Proceedings of the 14th ACM conference on Computer and communications security,2007:498-507 被引 2    
18.  Bost R. Machine learning classification over encrypted data. NDSS,2015:4324-4325 被引 1    
19.  Damgard I. Efficient and secure comparison for on-line auctions. Australasian Conference on Information Security and Privacy,2007:416-430 被引 2    
20.  Tueno A. Private evaluation of decision trees using sublinear cost. Proceedings on Privacy Enhancing Technologies,2019,2019(1):266-286 被引 2    
引证文献 1

1 秦宝东 基于双陷门同态加密的决策树分类模型 信息网络安全,2022(7):9-17
被引 0 次

显示所有1篇文献

论文科学数据集
PlumX Metrics
相关文献

 作者相关
 关键词相关
 参考文献相关

版权所有 ©2008 中国科学院文献情报中心 制作维护:中国科学院文献情报中心
地址:北京中关村北四环西路33号 邮政编码:100190 联系电话:(010)82627496 E-mail:cscd@mail.las.ac.cn 京ICP备05002861号-4 | 京公网安备11010802043238号