Efficient machine learning over encrypted data with non-interactive communication

被引:23
|
作者
Park, Heejin [1 ]
Kim, Pyung [2 ]
Kim, Heeyoul [3 ]
Park, Ki-Woong [4 ]
Lee, Younho [2 ]
机构
[1] SeoulTech, Div Ind & Informat Syst Engn, Grad Sch Policy & IT, Seoul, South Korea
[2] SeoulTech, Dept Ind & Syst Engn, ITM Div, Seoul, South Korea
[3] Kyonggi Univ, Dept Comp Sci, Suwon, Gyeonggi Do, South Korea
[4] Sejong Univ, Dept Comp & Informat Secur, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Privacy-preserving classification; Fully homomorphic encryption; Applied cryptography; Security; MEDICAL DIAGNOSIS;
D O I
10.1016/j.csi.2017.12.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we describe a protocol framework that can perform classification tasks in a privacy-preserving manner. To demonstrate the feasibility of the proposed framework, we implement two protocols supporting Naive Bayes classification. We overcome the heavy computational load of conventional fully homomorphic encryption based privacy-preserving protocols by using various optimization techniques. The proposed method differs from previous techniques insofar as it requires no intermediate interactions between the server and the client while executing the protocol, except for the mandatory interaction to obtain the decryption result of the encrypted classification output. As a result of this minimal interaction, the proposed method is relatively stable. Furthermore, the decryption key is used only once during the execution of the protocol, overcoming a potential security issue caused by the frequent exposure of the decryption key in memory. The proposed implementation uses a cryptographic primitive that is secure against attacks with quantum computers. Therefore, the framework described in this paper is expected to be robust against future quantum computer attacks. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:87 / 108
页数:22
相关论文
共 33 条
  • [1] Non-Interactive Privacy-Preserving Frequent Itemset Mining Over Encrypted Cloud Data
    Zheng, Peijia
    Cheng, Ziyan
    Tian, Xianhao
    Liu, Hongmei
    Luo, Weiqi
    Huang, Jiwu
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (04) : 3452 - 3468
  • [2] Non-interactive Opening for Ciphertexts Encrypted by Shared Keys
    Chen, Jiageng
    Emura, Keita
    Miyaji, Atsuko
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 57 - +
  • [3] Non-interactive certificate update protocol for efficient authentication in IoT
    Duan, Li
    Li, Yong
    Liao, Lijun
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 113 (113): : 132 - 144
  • [4] Private AI: Machine Learning on Encrypted Data
    Lauter, Kristin
    RECENT ADVANCES IN INDUSTRIAL AND APPLIED MATHEMATICS, 2022, : 97 - 113
  • [5] Ranked Keyword Search Over Encrypted Cloud Data Through Machine Learning Method
    Miao, Yinbin
    Zheng, Wei
    Jia, Xiaohua
    Liu, Ximeng
    Choo, Kim-Kwang Raymond
    Deng, Robert H.
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (01) : 525 - 536
  • [6] Support vector machine classification over encrypted data
    Huang, Hai
    Wang, Yongjian
    Zong, Haoran
    APPLIED INTELLIGENCE, 2022, 52 (06) : 5938 - 5948
  • [7] Efficient and non-interactive ciphertext range query based on differential privacy
    Feng, Peirou
    Sheng, Qitian
    Wang, Jianfeng
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2022, 25 (05) : 490 - 503
  • [8] Support vector machine classification over encrypted data
    Hai Huang
    Yongjian Wang
    Haoran Zong
    Applied Intelligence, 2022, 52 : 5938 - 5948
  • [9] Supervised machine learning using encrypted training data
    Francisco-Javier González-Serrano
    Adrián Amor-Martín
    Jorge Casamayón-Antón
    International Journal of Information Security, 2018, 17 : 365 - 377
  • [10] Supervised machine learning using encrypted training data
    Gonzalez-Serrano, Francisco-Javier
    Amor-Martin, Adrian
    Casamayon-Anton, Jorge
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (04) : 365 - 377