Practical protocol for Yao's millionaires problem enables secure multi-party computation of metrics and efficient privacy-preserving k-NN for large data sets

被引:6
作者
Amirbekyan, Artak [2 ]
Estivill-Castro, Vladimir [1 ]
机构
[1] Griffith Univ, Sch ICT, Brisbane, Qld 4111, Australia
[2] Univ Queensland, Earth Syst Sci Computat Ctr, Brisbane, Qld 4072, Australia
关键词
Privacy-preserving data mining; Secure multi-party computation; Nearest-neighbour classification; Yao's millionaires problem; SECRECY;
D O I
10.1007/s10115-009-0233-z
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Finding the nearest k objects to a query object is a fundamental operation for many data mining algorithms. With the recent interest in privacy, it is not surprising that there is strong interest in k-NN queries to enable clustering, classification and outlier-detection tasks. However, previous approaches to privacy-preserving k-NN have been costly and can only be realistically applied to small data sets. In this paper, we provide efficient solutions for k-NN queries for vertically partitioned data. We provide the first solution for the L (a) (or Chessboard) metric as well as detailed privacy-preserving computation of all other Minkowski metrics. We enable privacy-preserving L (a) by providing a practical approach to the Yao's millionaires problem with more than two parties. This is based on a pragmatic and implementable solution to Yao's millionaires problem with shares. We also provide privacy-preserving algorithms for combinations of local metrics into a global metric that handles the large dimensionality and diversity of attributes common in vertically partitioned data. To manage very large data sets, we provide a privacy-preserving SASH (a very successful data structure for associative queries in high dimensions). Besides providing a theoretical analysis, we illustrate the efficiency of our approach with an empirical evaluation.
引用
收藏
页码:327 / 363
页数:37
相关论文
共 63 条
[1]  
AMIRBEKYAN A, 2007, 18 AUSTR DAT C ADC20, P33
[2]  
Amirbekyan A, 2006, LECT NOTES COMPUT SC, V3975, P141
[3]  
Ankerst M, 1999, Proc Int Conf Intell Syst Mol Biol, P34
[4]   A multistep approach for shape similarity search in image databases [J].
Ankerst, M ;
Kriegel, HP ;
Seidl, T .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 1998, 10 (06) :996-1004
[5]  
[Anonymous], 1995, P 1995 ACM SIGMOD IN, DOI DOI 10.1145/223784.223794
[6]  
[Anonymous], 2000, 200009 LEID I ADV CO
[7]  
[Anonymous], 2003, Investigative Data Mining for Security and Criminal Detection
[8]  
[Anonymous], 1999, UNCONDITIONALL UNPUB
[9]  
ARYA S, 1994, 5 ANN ACM SIAM S DIS, P573
[10]  
Avidan S, 2006, LECT NOTES COMPUT SC, V3953, P1, DOI 10.1007/11744078_1