IDPriU: A two-party ID-private data union protocol for privacy-preserving machine learning

被引:0
作者
Yan, Jianping [1 ]
Wei, Lifei [1 ]
Qian, Xiansong [2 ]
Zhang, Lei [2 ]
机构
[1] Shanghai Maritime Univ, Coll Informat Engn, Shanghai 201306, Peoples R China
[2] Shanghai Ocean Univ, Coll Informat Technol, Shanghai 201306, Peoples R China
基金
上海市自然科学基金;
关键词
Private data union; Privacy-preserving machine learning; Data security; Data preprocessing; Private set union;
D O I
10.1016/j.jisa.2024.103913
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to significant data security concerns in machine learning, such as the data silo problem, there has been a growing trend towards the development of privacy-preserving machine learning applications. The initial step in training data across silos involves establishing secure data joins, specifically private data joins, to ensure the consistency and accuracy of the dataset. While the majority of current research focuses on the inner join of private data, this paper specifically addresses the privacy-preserving full join of private data and develops two-party unbalanced private data full join protocols utilizing secure multi-party computation tools. Notably, our paper introduces the novel component of Private Match-and-Connect (PMC), which performs a union operation on the ID and feature values, and ensure the secret sharing of the resulting union set. Each participant receives only a portion of the secret share, thereby guaranteeing data security during the pre-processing phase. Furthermore, we propose the two-party ID-private data union protocol (IDPriU), which facilitates secure and accurate matching of feature value shares and ID shares and also enables the data alignment. Our protocol represents a significant advancement in the field of privacy-preserving data preprocessing in machine learning and privacy-preserving federated queries. It extends the concept that private data joins are limited to inner connections, offering a novel approach by Private Set Union (PSU). We have experimentally implemented our protocol and obtained favorable results in terms of both runtime and communication overhead.
引用
收藏
页数:13
相关论文
共 57 条
  • [51] Son Nguyen, 2023, Cryptology ePrint Archive
  • [52] Sun Jiankai, 2021, arXiv
  • [53] Taunk K, 2019, PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), P1255, DOI [10.1109/iccs45141.2019.9065747, 10.1109/ICCS45141.2019.9065747]
  • [54] Federated Machine Learning: Concept and Applications
    Yang, Qiang
    Liu, Yang
    Chen, Tianjian
    Tong, Yongxin
    [J]. ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2019, 10 (02)
  • [55] A survey on federated learning
    Zhang, Chen
    Xie, Yu
    Bai, Hang
    Yu, Bin
    Li, Weihong
    Gao, Yuan
    [J]. KNOWLEDGE-BASED SYSTEMS, 2021, 216
  • [56] Zhang C, 2023, PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, P337
  • [57] Secure Multi-Party Computation for Machine Learning: A Survey
    Zhou, Ian
    Tofigh, Farzad
    Piccardi, Massimo
    Abolhasan, Mehran
    Franklin, Daniel
    Lipman, Justin
    [J]. IEEE ACCESS, 2024, 12 : 53881 - 53899