Efficient Privacy-Preserving Data Mining in Malicious Model

被引:0
作者
Emura, Keita [1 ]
Miyaji, Atsuko [1 ]
Rahman, Mohammad Shahriar [1 ]
机构
[1] Japan Adv Inst Sci & Technol, Ctr Highly Dependable Embedded Syst Technol, Nomi, Ishikawa 9231292, Japan
来源
ADVANCED DATA MINING AND APPLICATIONS, ADMA 2010, PT I | 2010年 / 6440卷
关键词
Privacy-preserving Data Mining; Malicious Model; Threshold Two-party Computation; Efficiency; PUBLIC-KEY ENCRYPTION; COMPUTATION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In many distributed data mining settings, disclosure of the original data sets is not acceptable due to privacy concerns. To address such concerns, privacy-preserving data mining has been an active research area in recent years. While confidentiality is a key issue, scalability is also an important aspect to assess the performance of a privacy-preserving data mining algorithms for practical applications. With this in mind, Kantarcioglu et al. proposed secure dot product and secure set-intersection protocols for privacy-preserving data mining in malicious adversarial model using zero knowledge proofs, since the assumption of semi-honest adversary is unrealistic in some settings. Both the computation and communication complexities are linear with the number of data items in the protocols proposed by Kantarcioglu et al. In this paper, we build efficient and secure dot product and set-intersection protocols in malicious model. In our work, the complexity of computation and communication for proof of knowledge is always constant (independent of the number of data items), while the complexity of computation and communication for the encrypted messages remains the same as in Kantarcioglu et al.'s work (linear with the number of data items). Furthermore, we provide the security model in Universal Composability framework.
引用
收藏
页码:370 / 382
页数:13
相关论文
共 50 条
[41]   PVIDM: Privacy-preserving verifiable shape context based image denoising and matching with efficient outsourcing in the malicious setting [J].
Zhou, Jun ;
Zheng, Meng ;
Cao, Zhenfu ;
Dong, Xiaolei .
COMPUTERS & SECURITY, 2020, 88
[42]   Insider Collusion Attack on Privacy-Preserving Kernel-Based Data Mining Systems [J].
Wang, Peter Shaojui ;
Lai, Feipei ;
Hsiao, Hsu-Chun ;
Wu, Ja-Ling .
IEEE ACCESS, 2016, 4 :2244-2255
[43]   Nonmetric Multidimensional Scaling: A Perturbation Model for Privacy-Preserving Data Clustering [J].
Alotaibi, Khaled ;
Rayward-Smith, Vic ;
de la Iglesia, Beatriz .
STATISTICAL ANALYSIS AND DATA MINING, 2014, 7 (03) :175-193
[44]   Efficient and Privacy-preserving Voice-based Search over mHealth Data [J].
Hadian, Mohammad ;
Altuwaiyan, Thamer ;
Liang, Xiaohui ;
Li, Wei .
2017 IEEE/ACM SECOND INTERNATIONAL CONFERENCE ON CONNECTED HEALTH - APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2017, :96-101
[45]   Research on Privacy Preserving Data Mining [J].
Wang, Pingshui ;
Wang, Jiandong ;
Zhu, Xinfeng ;
Jiang, Jian .
2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, :172-175
[46]   On data distortion for privacy preserving data mining [J].
Kabir, Saif M. A. ;
Youssef, Amr M. ;
Elhakeem, Ahmed K. .
2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, :308-311
[47]   Survey on privacy preserving data mining [J].
Wang P. .
International Journal of Digital Content Technology and its Applications, 2010, 4 (09) :1-7
[48]   Privacy-preserving data utilization in hybrid clouds [J].
Li, Jingwei ;
Li, Jin ;
Chen, Xiaofeng ;
Liu, Zheli ;
Jia, Chunfu .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 30 :98-106
[49]   Incentive Compatible Privacy-Preserving Data Analysis [J].
Kantarcioglu, Murat ;
Jiang, Wei .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2013, 25 (06) :1323-1335
[50]   Privacy-preserving data splitting: a combinatorial approach [J].
Farras, Oriol ;
Ribes-Gonzalez, Jordi ;
Ricci, Sara .
DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (07) :1735-1756