Towards Practical Privacy-Preserving Decision Tree Training and Evaluation in the Cloud

被引:59
作者
Liu, Lin [1 ]
Chen, Rongmao [1 ]
Liu, Ximeng [2 ]
Su, Jinshu [1 ]
Qiao, Linbo [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha 410073, Peoples R China
[2] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350108, Peoples R China
基金
中国国家自然科学基金;
关键词
Training; Decision trees; Cryptography; Cloud computing; Machine learning; Additives; Privacy; Privacy-preserving training; decision tree; cloud computing; data security and privacy; EFFICIENT;
D O I
10.1109/TIFS.2020.2980192
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to the capacity of storing massive data and providing huge computing resources, cloud computing has been a desirable platform for doing machine learning. However, the issue of data privacy is far from being well solved and thus has been a general concern in the cloud-aided machine learning. In this work, we investigate the study of how to efficiently do decision tree training and evaluation in the cloud and meanwhile achieve privacy preservation. Unlike existing cloud server-assisted model training approaches, in our proposed solution, the whole training process is mostly done by the cloud service provider who owns the machine learning model. Since the cloud cannot directly divide the encrypted dataset according to the best attributes selected, we propose a new method for decision tree training without dataset splitting. Precisely, we design three methods for decision tree training with the different tradeoff between privacy and efficiency. In all of these methods, the outsourced data are not revealed to the cloud service provider. We also propose a privacy-preserving decision tree evaluation scheme where the cloud service provider learns nothing about the user's input and the classification result while the trained model is kept secret to the user who could only learn the classification result. Compared with previous decision tree evaluation work, our scheme achieves desirable privacy preservation against both the user and the cloud service provider, and also minimizes the user's computation and communication costs. Moreover, besides protecting the data confidentiality, our proposed scheme also supports off-line users and thus has good scalability. The real-world dataset-based experimental results demonstrate that our system is of desirable utility and efficiency.
引用
收藏
页码:2914 / 2929
页数:16
相关论文
共 44 条
[11]  
Damgard Ivan, 2008, International Journal of Applied Cryptography, V1, P22, DOI 10.1504/IJACT.2008.017048
[12]   Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation [J].
De Cock, Martine ;
Dowsley, Rafael ;
Horst, Caleb ;
Katti, Raj ;
Nascimento, Anderson C. A. ;
Poon, Wing-Sea ;
Truex, Stacey .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (02) :217-230
[13]   Practical Secure Decision Tree Learning in a Teletreatment Application [J].
de Hoogh, Sebastiaan ;
Schoenmakers, Berry ;
Chen, Ping ;
op den Akker, Harm .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 :179-194
[14]  
Dowlin N, 2016, PR MACH LEARN RES, V48
[15]  
Du Wenliang, 2002, Proceedings of the IEEE International Conference on Privacy, Security and Data Mining, V14, P1
[16]  
Fredrikson M, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P17
[17]  
Goldreich O., 1987, P 19 ANN P ACM S THE, DOI DOI 10.1145/28395.28416
[18]  
Goldreich O., 2009, FDN CRYPTOGRAPHY, V2
[19]   Privacy-Preserving Decision Tree Learning with Boolean Target Class [J].
Kikuchi, Hiroaki ;
Itoh, Kouichi ;
Ushida, Mebae ;
Tsuda, Hiroshi ;
Yamaoka, Yuji .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (11) :2291-2300
[20]   Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption [J].
Kim, Jinsu ;
Koo, Dongyoung ;
Kim, Y. U. Na ;
Yoon, Hyunsoo ;
Shin, Junbum ;
Kim, Sungwook .
ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2018, 21 (04)