DAG: A General Model for Privacy-Preserving Data Mining

被引:12
作者
Teo, Sin G. [1 ]
Cao, Jianneng [2 ]
Lee, Vincent C. S. [1 ]
机构
[1] Monash Univ, Clayton Sch IT, Clayton, Vic 3800, Australia
[2] Inst Infocomm Res, Data Analyt Dept, Singapore, Singapore
关键词
Data models; Protocols; Cryptography; Task analysis; Data mining; Computational modeling; DAG; secure; operator; privacy; and data mining; MULTIPARTY COMPUTATION;
D O I
10.1109/TKDE.2018.2880743
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Secure multi-party computation (SMC) allows parties to jointly compute a function over their inputs, while keeping every input confidential. It has been extensively applied in tasks with privacy requirements, such as privacy-preserving data mining (PPDM), to learn task output and at the same time protect input data privacy. However, existing SMC-based solutions are ad-hoc - they are proposed for specific applications, and thus cannot be applied to other applications directly. To address this issue, we propose a privacy model $\mathsf {DAG}$DAG (Directed Acyclic Graph) that consists of a set of fundamental secure operators (e.g., +, -, , /, and power). Our model is general - its operators, if pipelined together, can implement various functions, even complicated ones like Nave Bayes classifier. It is also extendable - new secure operators can be defined to expand the functions that the model supports. For case study, we have applied our $\mathsf {DAG}$DAG model to two data mining tasks: kernel regression and Nave Bayes. Experimental results show that $\mathsf {DAG}$DAG generates outputs that are almost the same as those by non-private setting, where multiple parties simply disclose their data. The experimental results also show that our $\mathsf {DAG}$DAG model runs in acceptable time, e.g., in kernel regression, when training data size is 683,093, one prediction in non-private setting takes 5.93 sec, and that by our $\mathsf {DAG}$DAG model takes 12.38 sec.
引用
收藏
页码:40 / 53
页数:14
相关论文
共 37 条
[1]  
Aggarwal CC, 2008, ADV DATABASE SYST, V34, P1, DOI 10.1007/978-0-387-70992-5
[2]  
Agrawal R, 2003, P 2003 ACM SIGMOD IN, P86, DOI DOI 10.1145/872757.872771
[3]  
[Anonymous], [No title captured]
[4]  
[Anonymous], 2001, FDN CRYPTOGRAPHY
[5]  
[Anonymous], 1996, Public Law, V104, P191
[6]  
[Anonymous], 2005, P 11 ACM SIGKDD INT, DOI DOI 10.1145/1081870.1081942
[7]  
[Anonymous], 1996, HDB APPL CRYPTOGRAPH
[8]  
[Anonymous], 1997, Machine Learning
[9]  
BOILLAT Philippe., 2014, Handbook on European data protection law
[10]  
Bunn P, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P486