Privacy-Preserving Decentralised Singular Value Decomposition

被引:0
|
作者
Liu, Bowen [1 ]
Tang, Qiang [1 ]
机构
[1] Luxembourg Inst Sci & Technol LIST, 5 Ave Hauts Fourneaux, L-4362 Esch Sur Alzette, Luxembourg
关键词
D O I
10.1007/978-3-030-41579-2_41
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the proliferation of data and emerging data-driven applications, how to perform data analytical operations while respecting privacy concerns has become a very interesting research topic. With the advancement of communication and computing technologies, e.g. the FoG computing concept and its associated Edge computing technologies, it is now appealing to deploy decentralized data-driven applications. Following this trend, in this paper, we investigate privacy-preserving singular value decomposition (SVD) solutions tailored for these new computing environments. We first analyse a privacy-preserving SVD solution by Chen et al., which is based on the Paillier encryption scheme and some heuristic randomization method. We show that (1) their solution leaks statistical information to an individual player in the system; (2) their solution leaks much more information when more than one players collude. Based on the analysis, we present a new solution, which distributes the SVD results into two different players in a privacy-preserving manner. In comparison, our solution minimizes the information leakage to both individual player and colluded ones, via randomization and threshold homomorphic encryption techniques.
引用
收藏
页码:703 / 721
页数:19
相关论文
共 50 条
  • [41] Privacy-Preserving PayString Service
    de Cristo, Flaviene Scheidt
    Shbair, Wazen M.
    Trestioreanu, Lucian
    Malhotra, Aanchal
    State, Radu
    2021 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC), 2021,
  • [42] Privacy-Preserving Associative Classification
    Priyanka, Garach
    Darshana, Patel
    Radhika, Kotecha
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 2, 2018, 84 : 245 - 251
  • [43] Privacy-preserving email forensics
    Armknecht, Frederik
    Dewald, Andreas
    DIGITAL INVESTIGATION, 2015, 14 : S127 - S136
  • [44] Privacy-Preserving Portrait Matting
    Li, Jizhizi
    Ma, Sihan
    Zhang, Jing
    Tao, Dacheng
    PROCEEDINGS OF THE 29TH ACM INTERNATIONAL CONFERENCE ON MULTIMEDIA, MM 2021, 2021, : 3501 - 3509
  • [45] Privacy-preserving data mining
    Agrawal, R
    Srikant, R
    SIGMOD RECORD, 2000, 29 (02) : 439 - 450
  • [46] Privacy-preserving distributed clustering
    Erkin, Zekeriya
    Veugen, Thijs
    Toft, Tomas
    Lagendijk, Reginald L.
    EURASIP JOURNAL ON INFORMATION SECURITY, 2013, (01):
  • [47] Privacy-preserving webshopping with attributes
    Hampiholi, Brinda
    Alpar, Gergely
    2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), 2017, : 25 - 36
  • [48] Privacy-preserving linear programming
    O. L. Mangasarian
    Optimization Letters, 2011, 5 : 165 - 172
  • [49] PrivatePool: Privacy-Preserving Ridesharing
    Hallgren, Per
    Orlandi, Claudio
    Sabelfeld, Andrei
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 276 - 291
  • [50] Privacy-Preserving Remote Diagnostics
    Brickell, Justin
    Porter, Donald E.
    Shmatikov, Vitaly
    Witchel, Emmett
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 498 - 507