Privacy-preserving machine learning with multiple data providers

被引:64
作者
Li, Ping [1 ]
Li, Tong [2 ]
Ye, Heng [3 ]
Li, Jin [1 ]
Chen, Xiaofeng [4 ]
Xiang, Yang [5 ]
机构
[1] Guangzhou Univ, Sch Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[2] Nankai Univ, Coll Comp & Control Engn, Tianjin 300071, Peoples R China
[3] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Trans, 3 Shangyuancun, Beijing 100044, Peoples R China
[4] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710126, Shaanxi, Peoples R China
[5] Deakin Univ, Sch Informat Technol, Melbourne Burwood, Vic 3125, Australia
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 87卷
基金
中国国家自然科学基金;
关键词
Differential privacy; Homomorphic encryption; Outsourcing computation; Machine learning; PUBLIC-KEY CRYPTOSYSTEM; SECURE; BACKPROPAGATION; ENCRYPTION;
D O I
10.1016/j.future.2018.04.076
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the fast development of cloud computing, more and more data storage and computation are moved from the local to the cloud, especially the applications of machine learning and data analytics. However, the cloud servers are run by a third party and cannot be fully trusted by users. As a result, how to perform privacy-preserving machine learning over cloud data from different data providers becomes a challenge. Therefore, in this paper, we propose a novel scheme that protects the data sets of different providers and the data sets of cloud. To protect the privacy requirement of different providers, we use public-key encryption with a double decryption algorithm (DD-PKE) to encrypt their data sets with different public keys. To protect the privacy of data sets on the cloud, we use is an element of-differential privacy. Furthermore, the noises for the is an element of-differential privacy are added by the cloud server, instead of data providers, for different data analytics. Our scheme is proven to be secure in the security model. The experiments also demonstrate the efficiency of our protocol with different classical machine learning algorithms. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:341 / 350
页数:10
相关论文
共 35 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]  
[Anonymous], IEEE ACCESS
[3]  
[Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
[4]  
[Anonymous], J MACH LEARN RES
[5]  
[Anonymous], IEEE T IND INF
[6]  
[Anonymous], INT WORKSH SEL AR CR
[7]  
[Anonymous], INFORM SCI
[8]  
[Anonymous], IEEE T IND INF
[9]   Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data [J].
Bansal, Ankur ;
Chen, Tingting ;
Zhong, Sheng .
NEURAL COMPUTING & APPLICATIONS, 2011, 20 (01) :143-150
[10]  
Bos Joppe W., 2013, Cryptography and Coding. 14th IMA International Conference, IMACC 2013. Proceedings: LNCS 8308, P45, DOI 10.1007/978-3-642-45239-0_4