Privacy-Preserving Machine Learning

被引:3
作者
Chow, Sherman S. M. [1 ]
机构
[1] Chinese Univ Hong Kong, Dept Informat Engn, Shatin, Hong Kong, Peoples R China
来源
FRONTIERS IN CYBER SECURITY | 2018年 / 879卷
关键词
Machine learning; Processing encrypted data; Decision tree;
D O I
10.1007/978-981-13-3095-7_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The popularization of cloud computing and machine learning algorithms facilitates ranges of complex analytic services, such as medical or financial assessments. This allows a computationally-limited client to get predictions or classification results by paying for the analytic services. These services often involve sensitive data which should be kept private. Ideally, we hope for privacy-preserving machine learning services. The clients can learn the results of the model from a service provider without revealing their inputs and the results. Meanwhile, the trained model is kept confidential from the clients with as minimal leakage as possible. This keynote focuses on how cryptography can enable privacy-preserving machine learning services, in particular, decision tree evaluation.
引用
收藏
页码:3 / 6
页数:4
相关论文
共 10 条
[1]  
[Anonymous], 2009, NDSS
[2]   Machine Learning Classification over Encrypted Data [J].
Bost, Raphael ;
Popa, Raluca Ada ;
Tu, Stephen ;
Goldwasser, Shafi .
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
[3]  
Damgard Ivan, 2009, International Journal of Applied Cryptography, V1, P323, DOI 10.1504/IJACT.2009.028031
[4]   Private yet Efficient Decision Tree Evaluation [J].
Joye, Marc ;
Salehi, Fariborz .
DATA AND APPLICATIONS SECURITY AND PRIVACY XXXII, DBSEC 2018, 2018, 10980 :243-259
[5]  
Tai R.K.H., 2018, THESIS
[6]   Privacy-Preserving Decision Trees Evaluation via Linear Functions [J].
Tai, Raymond K. H. ;
Ma, Jack P. K. ;
Zhao, Yongjun ;
Chow, Sherman S. M. .
COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 :494-512
[7]  
Tueno A., 2019, POPETS, V1, P1
[8]  
Veugen T, 2012, IEEE INT WORKS INFOR, P49, DOI 10.1109/WIFS.2012.6412624
[9]  
Wang BY, 2014, IEEE CONF COMM NETW, P337, DOI 10.1109/CNS.2014.6997502
[10]  
Wu David J., 2016, Proceedings on Privacy Enhancing Technologies, V2016, P335, DOI 10.1515/popets-2016-0043