Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2022, Vol. 62 Issue (5) : 862-870     DOI: 10.16511/j.cnki.qhdxxb.2021.21.044
SPECIAL SECTION: VULNERABILITY ANALYSIS AND RISKA SSESSMENT |
Multi-key privacy protection decision tree evaluation scheme
CAO Laicheng, LI Yuntao, WU Rong, GUO Xian, FENG Tao
School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China
Download: PDF(2802 KB)   HTML
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks    
Abstract  A multi-key privacy-preserving decision tree evaluation (MPDE) scheme was developed to protect the privacy of decision tree data and models in machine learning and to reduce the computational and communications overhead. A distributed two-trapdoor public-key crypto (DT-PKC) was used to encrypt all the data. A secure addition- across-domains protocol was then used to add two ciphertexts from different public key cryptography systems. In addition, the original security comparison protocol was improved to support multi-user, multi-key systems to protect the privacy of the requested information, classification results and decision tree model. A trusted third party key generation center was introduced to reduce the communication overhead between entities which is completely offline after the key distribution. A service agent was then used to interact with the cloud server instead of the users which reduced the communications overhead between the user and the cloud server. Security and performance analyses show that the scheme is efficient and ensures privacy. Simulations show that the scheme has less computational overhead than previous schemes.
Keywords machine learning      cloud computing      decision tree      multi-key      homomorphic encryption     
Issue Date: 26 April 2022
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
CAO Laicheng
LI Yuntao
WU Rong
GUO Xian
FENG Tao
Cite this article:   
CAO Laicheng,LI Yuntao,WU Rong, et al. Multi-key privacy protection decision tree evaluation scheme[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(5): 862-870.
URL:  
http://jst.tsinghuajournals.com/EN/10.16511/j.cnki.qhdxxb.2021.21.044     OR     http://jst.tsinghuajournals.com/EN/Y2022/V62/I5/862
  
  
  
  
  
  
  
  
[1] 贾春福, 王雅飞, 陈阳, 等. 机器学习算法在同态加密数据集上的应用[J]. 清华大学学报(自然科学版), 2020, 60(6):456-463. JIA C F, WANG Y F, CHEN Y, et al. Machine learning algorithm for a homomorphic encrypted data set[J]. Journal of Tsinghua University (Science and Technology), 2020, 60(6):456-463. (in Chinese)
[2] WEN Y D, ZHANG K P, LI Z F, et al. A comprehensive study on center loss for deep face recognition[J]. International Journal of Computer Vision, 2019, 127(6-7):668-683.
[3] VAIDYA J, SHAFIQ B, FAN W, et al. A random decision tree framework for privacy-preserving data mining[J]. IEEE Transactions on Dependable and Secure Computing, 2014, 11(5):399-411.
[4] WANG T, MEI Y X, JIA W J, et al. Edge-based differential privacy computing for sensor-cloud systems[J]. Journal of Parallel and Distributed Computing, 2020, 136:75-85.
[5] BOST R, POPA R A, TU S, et al. Machine learning classification over encrypted data[C]//22nd Annual Network and Distributed System Security Symposium. San Diego, USA:The Internet Society, 2015:1-34.
[6] TUENO A, KERSCHBAUM F, KATZENBEISSER S. Private evaluation of decision trees using sublinear cost[C]//Proceedings on Privacy Enhancing Technologies (PoPETs). Sciendo:Warsaw, 2019:266-286.
[7] 刘睿瑄, 陈红, 郭若杨, 等. 机器学习中的隐私攻击与防御[J]. 软件学报, 2020, 31(3):866-892. LIU R X, CHEN H, GUO R Y, et al. Survey on privacy attacks and defenses in machine learning[J]. Journal of Software, 2020, 31(3):866-892. (in Chinese)
[8] DOWSLEY R, LACERDA F, NASCIMENTO A C A. Commitment and oblivious transfer in the bounded storage model with errors[J]. IEEE Transactions on Information Theory, 2018, 64(8):5970-5984.
[9] DE COCK M, DOWSLEY R, HORST C, et al. Efficient and private scoring of decision trees, support vector machines and logistic regression models based on pre-computation[J]. IEEE Transactions on Dependable and Secure Computing, 2019, 16(2):217-230.
[10] ALOUFI A, HU P Z, WONG H W H, et al. Blindfolded evaluation of random forests with multi-key homomorphic encryption[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(4):1821-1835.
[11] XUE L, LIU D X, NI J B, et al. Consent-based privacy-preserving decision tree evaluation[C]//2020 IEEE International Conference on Communications. Dublin, Ireland:IEEE Press, 2020:1-6.
[12] LIU L, CHEN R M, LIU X M, et al. Towards practical privacy-preserving decision tree training and evaluation in the cloud[J]. IEEE Transactions on Information Forensics and Security, 2020, 15:2914-2929.
[13] ZOU Y, ZHAO Z, SHI S, et al. Highly secure privacy-preserving outsourced K-means clustering under multiple keys in cloud computing[J]. Security and Communication Networks, 2020, 2020:1238505.
[14] KUANG W, CHAN Y L, TSANG S H, et al. Machine learning-based fast intra mode decision for HEVC screen content coding via decision trees[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020, 30(5):1481-1496.
[15] HASSAN A, HAMZA R, YAN H Y, et al. An efficient outsourced privacy preserving machine learning scheme with public verifiability[J]. IEEE Access, 2019, 7:146322-146330.
[1] WU Hao, NIU Fenglei. Machine learning model of radiation heat transfer in the high-temperature nuclear pebble bed[J]. Journal of Tsinghua University(Science and Technology), 2023, 63(8): 1213-1218.
[2] DAI Xin, HUANG Hong, JI Xinyu, WANG Wei. Spatiotemporal rapid prediction model of urban rainstorm waterlogging based on machine learning[J]. Journal of Tsinghua University(Science and Technology), 2023, 63(6): 865-873.
[3] REN Jianqiang, CUI Yapeng, NI Shunjiang. Prediction method of the pandemic trend of COVID-19 based on machine learning[J]. Journal of Tsinghua University(Science and Technology), 2023, 63(6): 1003-1011.
[4] AN Jian, CHEN Yuxuan, SU Xingyu, ZHOU Hua, REN Zhuyin. Applications and prospects of machine learning in turbulent combustion and engines[J]. Journal of Tsinghua University(Science and Technology), 2023, 63(4): 462-472.
[5] ZHAO Qiming, BI Kexin, QIU Tong. Comparison and integration of machine learning based ethylene cracking process models[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(9): 1450-1457.
[6] WANG Haojie, MA Zixuan, ZHENG Liyan, WANG Yuanwei, WANG Fei, ZHAI Jidong. Efficient memory allocator for the New Generation Sunway supercomputer[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(5): 943-951.
[7] LU Sicong, LI Chunwen. Human-machine conversation system for chatting based on scene and topic[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(5): 952-958.
[8] LI Wei, LI Chenglong, YANG Jiahai. As-Stream: An intelligent operator parallelization strategy for fluctuating data streams[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(12): 1851-1863.
[9] LIU Qiangmo, HE Xu, ZHOU Baishun, WU Haolin, ZHANG Chi, QIN Yu, SHEN Xiaomei, GAO Xiaorong. Simple and high performance classification model for autism based on machine learning and pupillary response[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(10): 1730-1738.
[10] MA Xiaoyue, MENG Xiao. Image position and layout effects of multi-image tweets from the perspective of user engagement[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(1): 77-87.
[11] TANG Zhili, WANG Xue, XU Qianjun. Rockburst prediction based on oversampling and objective weighting method[J]. Journal of Tsinghua University(Science and Technology), 2021, 61(6): 543-555.
[12] LI Qing, FAN Yiping, LI Dachuan, JIANG Xin, LIU Enyu, CHEN Jia. Architecture of a microservice-based flight management system simulation[J]. Journal of Tsinghua University(Science and Technology), 2020, 60(7): 589-596.
[13] JIA Chunfu, WANG Yafei, CHEN Yang, SUN Mengjie, GE Fengyi. Machine learning algorithm for a homomorphic encrypted data set[J]. Journal of Tsinghua University(Science and Technology), 2020, 60(6): 456-463.
[14] WANG Zhiguo, ZHANG Yujin. Anomaly detection in surveillance videos: A survey[J]. Journal of Tsinghua University(Science and Technology), 2020, 60(6): 518-529.
[15] SONG Yubo, QI Xinyu, HUANG Qiang, HU Aiqun, YANG Junjie. Two-stage multi-classification algorithm for Internet of Things equipment identification[J]. Journal of Tsinghua University(Science and Technology), 2020, 60(5): 365-370.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd