Efficient Privacy-Preserving Data Mining in Malicious Model

被引:0
|
作者
Emura, Keita [1 ]
Miyaji, Atsuko [1 ]
Rahman, Mohammad Shahriar [1 ]
机构
[1] Japan Adv Inst Sci & Technol, Ctr Highly Dependable Embedded Syst Technol, Nomi, Ishikawa 9231292, Japan
关键词
Privacy-preserving Data Mining; Malicious Model; Threshold Two-party Computation; Efficiency; PUBLIC-KEY ENCRYPTION; COMPUTATION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In many distributed data mining settings, disclosure of the original data sets is not acceptable due to privacy concerns. To address such concerns, privacy-preserving data mining has been an active research area in recent years. While confidentiality is a key issue, scalability is also an important aspect to assess the performance of a privacy-preserving data mining algorithms for practical applications. With this in mind, Kantarcioglu et al. proposed secure dot product and secure set-intersection protocols for privacy-preserving data mining in malicious adversarial model using zero knowledge proofs, since the assumption of semi-honest adversary is unrealistic in some settings. Both the computation and communication complexities are linear with the number of data items in the protocols proposed by Kantarcioglu et al. In this paper, we build efficient and secure dot product and set-intersection protocols in malicious model. In our work, the complexity of computation and communication for proof of knowledge is always constant (independent of the number of data items), while the complexity of computation and communication for the encrypted messages remains the same as in Kantarcioglu et al.'s work (linear with the number of data items). Furthermore, we provide the security model in Universal Composability framework.
引用
收藏
页码:370 / 382
页数:13
相关论文
共 50 条
  • [21] Optimizing Privacy-Preserving Data Mining Model in Multivariate Datasets
    Yaji, Sharath
    Neelima, B.
    2019 PHD COLLOQUIUM ON ETHICALLY DRIVEN INNOVATION AND TECHNOLOGY FOR SOCIETY (PHD EDITS), 2019,
  • [22] Privacy-preserving data mining through knowledge model sharing
    Sharkey, Patrick
    Tian, Hongwei
    Zhang, Weining
    Xu, Shouhuai
    PRIVACY, SECURITY, AND TRUST IN KDD, 2008, 4890 : 97 - 115
  • [23] An efficient reversible privacy-preserving data mining technology over data streams
    Lin, Chen-Yi
    Kao, Yuan-Hung
    Lee, Wei-Bin
    Chen, Rong-Chang
    SPRINGERPLUS, 2016, 5
  • [24] A DCT-based privacy-preserving approach for efficient data mining
    Tian, Feng
    Gui, Xiaolin
    An, Jian
    Yang, Pan
    Zhang, Xuejun
    Zhao, Jianqiang
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3641 - 3652
  • [25] Research on Privacy-Preserving Technology of Data Mining
    Shen, Yanguang
    Han, Junrui
    HuiShao
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL II, PROCEEDINGS, 2009, : 612 - 614
  • [26] Research on distributed privacy-preserving data mining
    Jia, Zhe
    Pang, Lei
    Luo, Shoushan
    Xin, Yang
    Zhang, Miao
    Journal of Convergence Information Technology, 2012, 7 (01) : 356 - 367
  • [27] Privacy-preserving data mining in electronic surveys
    Zhan, J
    Matwin, S
    SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 1179 - 1185
  • [28] Privacy-Preserving Data Mining for Smart Manufacturing
    Hu, Qianyu
    Chen, Ruimin
    Yang, Hui
    Kumara, Soundar
    SMART AND SUSTAINABLE MANUFACTURING SYSTEMS, 2020, 4 (02): : 99 - 120
  • [29] Privacy-preserving data mining in electronic surveys
    Zhan, Justin
    Matwin, Stan
    International Journal of Network Security, 2007, 4 (03) : 318 - 327
  • [30] Privacy-preserving data mining: Developments and directions
    Thuraisingham, B
    JOURNAL OF DATABASE MANAGEMENT, 2005, 16 (01) : 75 - 87