Efficient Privacy-Preserving Logistic Model With Malicious Security

被引:0
作者
Miao, Guanhong [1 ]
Wu, Samuel S. [2 ]
机构
[1] Univ Florida, Dept Epidemiol, Gainesville, FL 32611 USA
[2] Univ Florida, Dept Biostat, Gainesville, FL 32611 USA
基金
美国国家卫生研究院;
关键词
Encryption; Computational modeling; Servers; Logistics; TV; Protocols; Data models; Privacy-preserving; logistic model; malicious adversary; indistinguishability;
D O I
10.1109/TIFS.2024.3402319
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Conducting secure computations to protect against malicious adversaries is an emerging field of research. Current models designed for malicious security typically necessitate the involvement of two or more servers in an honest-majority setting. Among privacy-preserving data mining techniques, significant attention has been focused on the classification problem. Logistic regression emerges as a well-established classification model, renowned for its impressive performance. We introduce a novel matrix encryption method to build a maliciously secure logistic model. Our scheme involves only a single semi-honest server and is resilient to malicious data providers that may deviate arbitrarily from the scheme. The d-transformation ensures that our scheme achieves indistinguishability (i.e., no adversary can determine, in polynomial time, which of the plaintexts corresponds to a given ciphertext in a chosen-plaintext attack). Malicious activities of data providers can be detected in the verification stage. A lossy compression method is implemented to minimize communication costs while preserving negligible degradation in accuracy. Experiments illustrate that our scheme is highly efficient to analyze large-scale datasets and achieves accuracy similar to non-private models. The proposed scheme outperforms other maliciously secure frameworks in terms of computation and communication costs.
引用
收藏
页码:5751 / 5766
页数:16
相关论文
共 61 条
[11]  
Dua D., 2017, UCI MACHINE LEARNING
[12]  
Dwork Cynthia., 2011, ENCY CRYPTOGRAPHY SE, P338, DOI [10.1007/11787006, 10.1007/978-1-4419-5906-5752, DOI 10.1007/978-1-4419-5906-5752]
[13]   Privacy preserving based logistic regression on big data [J].
Fan, Yongkai ;
Bai, Jianrong ;
Lei, Xia ;
Zhang, Yuqing ;
Zhang, Bin ;
Li, Kuan-Ching ;
Tan, Gang .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 171
[14]  
Ferrie F. P., 2012, P AS C MACH LEARN, P1
[15]   On choosing and bounding probability metrics [J].
Gibbs, AL ;
Su, FE .
INTERNATIONAL STATISTICAL REVIEW, 2002, 70 (03) :419-435
[16]  
Goldreich Oded., 1987, STOC, P218, DOI [10.1145/28395. 28420, DOI 10.1145/28395.28420]
[17]  
Gordon SD, 2018, LECT NOTES COMPUT SC, V11274, P59, DOI 10.1007/978-3-030-03332-3_3
[18]   Sharp Inequalities for f-Divergences [J].
Guntuboyina, Adityanand ;
Saha, Sujayam ;
Schiebinger, Geoffrey .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (01) :104-121
[19]  
Hastie Trevor., 2009, The elements of statistical learning, V2, DOI DOI 10.1007/978-0-387-84858-7
[20]   Composing Differential Privacy and Secure Computation: A case study on scaling private record linkage [J].
He, Xi ;
Machanavajjhala, Ashwin ;
Flynn, Cheryl ;
Srivastava, Divesh .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1389-1406