A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party Analytics

被引:16
|
作者
Mehnaz, Shagufta [1 ]
Bellala, Gowtham [2 ]
Bertino, Elisa [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] C3 IoT, Redwood City, CA USA
来源
PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17) | 2017年
关键词
D O I
10.1145/3078861.3078869
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many enterprises are transitioning towards data-driven business processes. There are numerous situations where multiple parties would like to share data towards a common goal if it were possible to simultaneously protect the privacy and security of the individuals and organizations described in the data. Existing solutions for multi-party analytics that follow the so called Data Lake paradigm have parties transfer their raw data to a trusted third-party (i.e., mediator), which then performs the desired analysis on the global data, and shares the results with the parties. However, such a solution does not fit many applications such as Healthcare, Finance, and the Internet-of-things, where privacy is a strong concern. Motivated by the increasing demands for data privacy, we study the problem of privacy-preserving multi-party data analytics, where the goal is to enable analytics on multi-party data without compromising the data privacy of each individual party. In this paper, we first propose a secure sum protocol with strong security guarantees. The proposed secure sum protocol is resistant to collusion attacks even with N - 2 parties colluding, where N denotes the total number of collaborating parties. We then use this protocol to propose two secure gradient descent algorithms, one for horizontally partitioned data, and the other for vertically partitioned data. The proposed framework is generic and applies to a wide class of machine learning problems. We demonstrate our solution for two popular use-cases, regression and classification, and evaluate the performance of the proposed solution in terms of the obtained model accuracy, latency and communication cost. In addition, we perform a scalability analysis to evaluate the performance of the proposed solution as the data size and the number of parties increase.
引用
收藏
页码:219 / 230
页数:12
相关论文
共 50 条
  • [1] Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model
    Neugebauer, Georg
    Brutschy, Lucas
    Meyer, Ulrike
    Wetzel, Susanne
    DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, DPM 2013, 2014, 8247 : 178 - 193
  • [2] A Scalable Multi-Party Protocol for Privacy-Preserving Equality Test
    Sepehri, Maryam
    Cimato, Stelvio
    Damiani, Ernesto
    ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS (CAISE), 2013, 148 : 466 - 477
  • [3] Privacy-preserving Multi-party Analytics over Arbitrarily Partitioned Data
    Mehnaz, Shagufta
    Bertino, Elisa
    2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 342 - 349
  • [4] Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries
    Wueller, Stefan
    Meyer, Ulrike
    Wetzel, Susanne
    2017 15TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2017, : 205 - 214
  • [5] Efficient Secure Multi-party Computation for Multi-dimensional Arithmetics and Its Application in Privacy-Preserving Biometric Identification
    Wu, Dongyu
    Liang, Bei
    Lu, Zijie
    Ding, Jintai
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2024, PT I, 2025, 14905 : 3 - 25
  • [6] A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations
    Dagdelen, Oezguer
    Venturi, Daniele
    CRYPTOGRAPHY AND INFORMATION SECURITY IN THE BALKANS, 2015, 9024 : 161 - 172
  • [7] Secure and Efficient Multi-Party Directory Publication for Privacy-Preserving Data Sharing
    Areekijseree, Katchaguy
    Tang, Yuzhe
    Chen, Ju
    Wang, Shuang
    Iyengar, Arun
    Palanisamy, Balaji
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 71 - 94
  • [8] Efficient privacy-preserving Gaussian process via secure multi-party computation
    Liu, Shiyu
    Luo, Jinglong
    Zhang, Yehong
    Wang, Hui
    Yu, Yue
    Xu, Zenglin
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 151
  • [9] Privacy-Preserving Secure Computation of Skyline Query in Distributed Multi-Party Databases †
    Qaosar, Mahboob
    Zaman, Asif
    Siddique, Md. Anisuzzaman
    Annisa
    Morimoto, Yasuhiko
    INFORMATION, 2019, 10 (03):
  • [10] Privacy-Preserving Power Flow Analysis via Secure Multi-Party Computation
    von der Heyden, Jonas
    Schlueter, Nils
    Binfet, Philipp
    Asman, Martin
    Zdrallek, Markus
    Jager, Tibor
    Darup, Moritz Schulze
    IEEE TRANSACTIONS ON SMART GRID, 2025, 16 (01) : 344 - 355