Abstract
Nowadays organizations and individuals outsource computation and storage to cloud. This poses a threat to the privacy of users. Different users encrypt their private data with (possibly) different keys to prevent any kind of outside attack on their privacy. In this outsourced model of computation where the data owners have already encrypted and uploaded private data, to enable the users for collaborative data mining a scheme is needed that can process encrypted data under multiple keys. Privacy preserving inner product computation is an essential tool on which many data mining algorithms are based. Several papers address the problem of outsourced privacy preserving inner product computation but none of them deals with the scenario when the entire database is arbitrarily partitioned among the users. We propose two outsourced privacy preserving protocols for computation of inner product of vectors when the underlying database is arbitrarily partitioned. We provide an SVM training model that preserves the privacy of the user’s data-vectors. Our scheme is based on an integer vector encryption scheme.
S. Dutta—Grateful to the NICT, Japan for granting a financial support under the NICT International Exchange Program.
S. Ruj—This work is partially supported by Cisco University Research Program Fund, CyberGrants ID: 698039 and Silicon Valley Community Foundation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
NTL: A Library for doing Number Theory. http://www.shoup.net/ntl/
Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: ACM SIGMOD Conference on Management of Data 2000, pp. 439–450 (2000)
Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF Formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325–341. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-30576-7_18
Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273–297 (1995)
Du, W., Atallah, M.J.: Privacy-preserving cooperative statistical analysis. In: ACSAC 2001, pp. 102–110 (2001)
Goethals, B., Laur, S., Lipmaa, H., Mielikäinen, T.: On private scalar product computation for privacy-preserving data mining. In: Park, C., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 104–120. Springer, Heidelberg (2005). https://doi.org/10.1007/11496618_9
Lindell, Y., Pinkas, B.: Privacy preserving data mining. J. Cryptol. 15(3), 177–206 (2002)
Liu, F., Ng, W.K., Zhang, W.: Encrypted scalar product protocol for outsourced data mining. In: IEEE CLOUD 2014, pp. 336–343 (2014)
Liu, F., Ng, W.K., Zhang, W.: Encrypted SVM for outsourced data mining. IEEE CLOUD 2015, pp. 1085–1092 (2015)
Liu, F., Ng, W.K., Zhang, W.: Secure scalar product for big-data in MapReduce. In: IEEE Big Data Service 2015, pp. 120–129 (2015)
Lopez-Alt, A., Tromer, E., Vaikuntanathan, V.: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: STOC 2012, pp. 1219–1234 (2012)
Mehnaz, S., Bertino, E.: Privacy-preserving multi-party analytics over arbitrarily partitioned data. In: CLOUD 2017, pp. 342–349 (2017)
Peter, A., Tews, E., Katzenbeisser, S.: Efficiently outsourcing multiparty computation under multiple keys. IEEE Trans. Inf. Forensics Secur. 8(12), 2046–2058 (2013)
Vaidya, J., Clifton, C.: Privacy preserving association rule mining in vertically partitioned data. In: KDD 2002, pp. 639–644 (2002)
Vaidya, J., Yu, H., Jiang, X.: Privacy-preserving SVM classification. Knowl. Inf. Syst. 14(2), 161–178 (2008)
Wang, B., Li, M., Chow, S.S., Li, H.: Computing encrypted cloud data efficiently under multiple keys. In: IEEE CNS 2013, pp. 504–513 (2013)
Wang, B., Li, M., Chow, S.S., Li, H.: A tale of two clouds: computing on data encrypted under multiple keys. In: IEEE CNS 2014, pp. 337–345 (2014)
Yu, H., Vaidya, J., Jiang, X.: Privacy-preserving SVM classification on vertically partitioned data. In: Ng, W.-K., Kitsuregawa, M., Li, J., Chang, K. (eds.) PAKDD 2006. LNCS (LNAI), vol. 3918, pp. 647–656. Springer, Heidelberg (2006). https://doi.org/10.1007/11731139_74
Yu, H., Jiang, X., Vaidya, J.: Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data. In: SAC 2006, pp. 603–610 (2006)
Zhang, J., Wang, X., Yiu, S.M., Jiang, Z.L., Li, J.: Secure dot product of outsourced encrypted vectors and its application to SVM. In: SCC\(@\)AsiaCCS 2017, pp. 75–82 (2017)
Yu, A., Lai, W.L., Payor, J.: Efficient integer vector homomorphic encryption (2015). https://courses.csail.mit.edu/6.857/2015/files/yu-lai-payor.pdf
Zhou, H., Wornell, G.W.: Efficient homomorphic encryption on integer vectors and its applications. In: ITA 2014, pp. 1–9 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Dutta, S., Nikam, N., Ruj, S. (2018). Secure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to SVM. In: Su, C., Kikuchi, H. (eds) Information Security Practice and Experience. ISPEC 2018. Lecture Notes in Computer Science(), vol 11125. Springer, Cham. https://doi.org/10.1007/978-3-319-99807-7_34
Download citation
DOI: https://doi.org/10.1007/978-3-319-99807-7_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-99806-0
Online ISBN: 978-3-319-99807-7
eBook Packages: Computer ScienceComputer Science (R0)