Privacy-preserving outsourcing decision tree evaluation from homomorphic encryption

被引:3
|
作者
Xu, Kexin [1 ,2 ,3 ]
Tan, Benjamin Hong Meng [4 ]
Wang, Li-Ping [1 ,2 ,3 ]
Aung, Khin Mi Mi [4 ]
Wang, Huaxiong [5 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] State Key Lab Cryptol, Beijing, Peoples R China
[3] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[4] ASTAR, Inst Infocomm Res I2R, Singapore, Singapore
[5] Nanyang Technol Univ, Sch Phys & Math Sci, Singapore, Singapore
关键词
Decision tree; Outsourcing computation; Cloud computing; Homomorphic encryption; Privacy preserving;
D O I
10.1016/j.jisa.2023.103582
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A decision tree is a common algorithm in machine learning, which performs classification prediction based on a tree structure. In real-world scenarios, input attribute values may be sensitive and tree models are usually private, thus the computation potentially incurs security and privacy risks. In this paper, we focus on how to retain privacy when outsourcing decision tree evaluation. Leveraging homomorphic encryption, our construction achieves data confidentiality against semi-honest adversaries while enabling both the client (who provides the attributes) and the model holder to be offline during evaluation. Based on an unbalanced computational-ability two-server model, we achieve single-branch evaluation, which is exponentially less computation than previous schemes that evaluated the entire decision tree. A proof-of-concept implementation demonstrates this. Additionally, with multi-key encryption and joint decryption, our protocol easily supports multi-client scenarios.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] A privacy-preserving parallel and homomorphic encryption scheme
    Min, Zhaoe
    Yang, Geng
    Shi, Jingqi
    OPEN PHYSICS, 2017, 15 (01): : 135 - 142
  • [2] A Review of Homomorphic Encryption for Privacy-Preserving Biometrics
    Yang, Wencheng
    Wang, Song
    Cui, Hui
    Tang, Zhaohui
    Li, Yan
    SENSORS, 2023, 23 (07)
  • [3] Privacy-Preserving Decentralized Optimization Using Homomorphic Encryption
    Huo, Xiang
    Liu, Mingxi
    IFAC PAPERSONLINE, 2020, 53 (05): : 630 - 633
  • [4] Privacy-Preserving Swarm Learning Based on Homomorphic Encryption
    Chen, Lijie
    Fu, Shaojing
    Lin, Liu
    Luo, Yuchuan
    Zhao, Wentao
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT III, 2022, 13157 : 509 - 523
  • [5] Privacy-Preserving Federated Learning Using Homomorphic Encryption
    Park, Jaehyoung
    Lim, Hyuk
    APPLIED SCIENCES-BASEL, 2022, 12 (02):
  • [6] Privacy-preserving word vectors learning using partially homomorphic encryption
    Ci, Shang
    Hu, Sen
    Guan, Donghai
    Koc, cetin Kaya
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 89
  • [7] Privacy-Preserving Federated Learning with Homomorphic Encryption and Sparse Compression
    Yang, Wentao
    Bai, Yang
    Rao, Yutang
    Wu, Hongyan
    Xing, Gaojie
    Zhou, Yimin
    2024 4TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND ARTIFICIAL INTELLIGENCE, CCAI 2024, 2024, : 192 - 198
  • [8] Privacy-preserving using homomorphic encryption in Mobile IoT systems
    Ren, Wang
    Tong, Xin
    Du, Jing
    Wang, Na
    Li, Shan Cang
    Min, Geyong
    Zhao, Zhiwei
    Bashir, Ali Kashif
    COMPUTER COMMUNICATIONS, 2021, 165 : 105 - 111
  • [9] Privacy-preserving neural networks with Homomorphic encryption: Challenges and opportunities
    Bernardo Pulido-Gaytan
    Andrei Tchernykh
    Jorge M. Cortés-Mendoza
    Mikhail Babenko
    Gleb Radchenko
    Arutyun Avetisyan
    Alexander Yu Drozdov
    Peer-to-Peer Networking and Applications, 2021, 14 : 1666 - 1691
  • [10] Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption
    Alabdulatif, Abdulatif
    Kumarage, Heshan
    Khalil, Ibrahim
    Yi, Xun
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2017, 90 : 28 - 45