Efficient Privacy-Preserving Logistic Model With Malicious Security

被引:0
作者
Miao, Guanhong [1 ]
Wu, Samuel S. [2 ]
机构
[1] Univ Florida, Dept Epidemiol, Gainesville, FL 32611 USA
[2] Univ Florida, Dept Biostat, Gainesville, FL 32611 USA
基金
美国国家卫生研究院;
关键词
Encryption; Computational modeling; Servers; Logistics; TV; Protocols; Data models; Privacy-preserving; logistic model; malicious adversary; indistinguishability;
D O I
10.1109/TIFS.2024.3402319
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Conducting secure computations to protect against malicious adversaries is an emerging field of research. Current models designed for malicious security typically necessitate the involvement of two or more servers in an honest-majority setting. Among privacy-preserving data mining techniques, significant attention has been focused on the classification problem. Logistic regression emerges as a well-established classification model, renowned for its impressive performance. We introduce a novel matrix encryption method to build a maliciously secure logistic model. Our scheme involves only a single semi-honest server and is resilient to malicious data providers that may deviate arbitrarily from the scheme. The d-transformation ensures that our scheme achieves indistinguishability (i.e., no adversary can determine, in polynomial time, which of the plaintexts corresponds to a given ciphertext in a chosen-plaintext attack). Malicious activities of data providers can be detected in the verification stage. A lossy compression method is implemented to minimize communication costs while preserving negligible degradation in accuracy. Experiments illustrate that our scheme is highly efficient to analyze large-scale datasets and achieves accuracy similar to non-private models. The proposed scheme outperforms other maliciously secure frameworks in terms of computation and communication costs.
引用
收藏
页码:5751 / 5766
页数:16
相关论文
共 61 条
[1]   A Survey on Homomorphic Encryption Schemes: Theory and Implementation [J].
Acar, Abbas ;
Aksu, Hidayet ;
Uluagac, A. Selcuk ;
Conti, Mauro .
ACM COMPUTING SURVEYS, 2018, 51 (04)
[2]  
Bellare Mihir., 2012, the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012, P784, DOI [10.1145/2382196.2382279, DOI 10.1145/2382196.2382279]
[3]   Analysis of One-Time Random Projections for Privacy Preserving Compressed Sensing [J].
Bianchi, Tiziano ;
Bioglio, Valerio ;
Magli, Enrico .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (02) :313-327
[4]  
Byali Megha, 2020, Proceedings on Privacy Enhancing Technologies, V2020, P459, DOI [10.2478/popets-2020-0036, 10.2478/popets-2020-0036]
[5]   Universally Composable Security [J].
Canetti, Ran .
JOURNAL OF THE ACM, 2020, 67 (05)
[6]   Use cases of lossy compression for floating-point data in scientific data sets [J].
Cappello, Franck ;
Di, Sheng ;
Li, Sihuan ;
Liang, Xin ;
Gok, Ali Murat ;
Tao, Dingwen ;
Yoon, Chun Hong ;
Wu, Xin-Chuan ;
Alexeev, Yuri ;
Chong, Frederic T. .
INTERNATIONAL JOURNAL OF HIGH PERFORMANCE COMPUTING APPLICATIONS, 2019, 33 (06) :1201-1220
[7]   Secure and Efficient Compressed Sensing-Based Encryption With Sparse Matrices [J].
Cho, Wonwoo ;
Yu, Nam Yul .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :1999-2011
[8]  
Dalskov A, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P2183
[9]  
DasGupta A, 2008, SPRINGER TEXTS STAT, P1
[10]   Fast Error-bounded Lossy HPC Data Compression with SZ [J].
Di, Sheng ;
Cappello, Franck .
2016 IEEE 30TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS 2016), 2016, :730-739