Skip to main content

Secure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to SVM

  • Conference paper
  • First Online:
Information Security Practice and Experience (ISPEC 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11125))

Abstract

Nowadays organizations and individuals outsource computation and storage to cloud. This poses a threat to the privacy of users. Different users encrypt their private data with (possibly) different keys to prevent any kind of outside attack on their privacy. In this outsourced model of computation where the data owners have already encrypted and uploaded private data, to enable the users for collaborative data mining a scheme is needed that can process encrypted data under multiple keys. Privacy preserving inner product computation is an essential tool on which many data mining algorithms are based. Several papers address the problem of outsourced privacy preserving inner product computation but none of them deals with the scenario when the entire database is arbitrarily partitioned among the users. We propose two outsourced privacy preserving protocols for computation of inner product of vectors when the underlying database is arbitrarily partitioned. We provide an SVM training model that preserves the privacy of the user’s data-vectors. Our scheme is based on an integer vector encryption scheme.

S. Dutta—Grateful to the NICT, Japan for granting a financial support under the NICT International Exchange Program.

S. Ruj—This work is partially supported by Cisco University Research Program Fund, CyberGrants ID: 698039 and Silicon Valley Community Foundation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. NTL: A Library for doing Number Theory. http://www.shoup.net/ntl/

  2. Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: ACM SIGMOD Conference on Management of Data 2000, pp. 439–450 (2000)

    Article  Google Scholar 

  3. Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF Formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325–341. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-30576-7_18

    Chapter  Google Scholar 

  4. Cortes, C., Vapnik, V.: Support-vector networks. Mach. Learn. 20(3), 273–297 (1995)

    MATH  Google Scholar 

  5. Du, W., Atallah, M.J.: Privacy-preserving cooperative statistical analysis. In: ACSAC 2001, pp. 102–110 (2001)

    Google Scholar 

  6. Goethals, B., Laur, S., Lipmaa, H., Mielikäinen, T.: On private scalar product computation for privacy-preserving data mining. In: Park, C., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 104–120. Springer, Heidelberg (2005). https://doi.org/10.1007/11496618_9

    Chapter  Google Scholar 

  7. Lindell, Y., Pinkas, B.: Privacy preserving data mining. J. Cryptol. 15(3), 177–206 (2002)

    Article  MathSciNet  Google Scholar 

  8. Liu, F., Ng, W.K., Zhang, W.: Encrypted scalar product protocol for outsourced data mining. In: IEEE CLOUD 2014, pp. 336–343 (2014)

    Google Scholar 

  9. Liu, F., Ng, W.K., Zhang, W.: Encrypted SVM for outsourced data mining. IEEE CLOUD 2015, pp. 1085–1092 (2015)

    Google Scholar 

  10. Liu, F., Ng, W.K., Zhang, W.: Secure scalar product for big-data in MapReduce. In: IEEE Big Data Service 2015, pp. 120–129 (2015)

    Google Scholar 

  11. Lopez-Alt, A., Tromer, E., Vaikuntanathan, V.: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: STOC 2012, pp. 1219–1234 (2012)

    Google Scholar 

  12. Mehnaz, S., Bertino, E.: Privacy-preserving multi-party analytics over arbitrarily partitioned data. In: CLOUD 2017, pp. 342–349 (2017)

    Google Scholar 

  13. Peter, A., Tews, E., Katzenbeisser, S.: Efficiently outsourcing multiparty computation under multiple keys. IEEE Trans. Inf. Forensics Secur. 8(12), 2046–2058 (2013)

    Article  Google Scholar 

  14. Vaidya, J., Clifton, C.: Privacy preserving association rule mining in vertically partitioned data. In: KDD 2002, pp. 639–644 (2002)

    Google Scholar 

  15. Vaidya, J., Yu, H., Jiang, X.: Privacy-preserving SVM classification. Knowl. Inf. Syst. 14(2), 161–178 (2008)

    Article  Google Scholar 

  16. Wang, B., Li, M., Chow, S.S., Li, H.: Computing encrypted cloud data efficiently under multiple keys. In: IEEE CNS 2013, pp. 504–513 (2013)

    Google Scholar 

  17. Wang, B., Li, M., Chow, S.S., Li, H.: A tale of two clouds: computing on data encrypted under multiple keys. In: IEEE CNS 2014, pp. 337–345 (2014)

    Google Scholar 

  18. Yu, H., Vaidya, J., Jiang, X.: Privacy-preserving SVM classification on vertically partitioned data. In: Ng, W.-K., Kitsuregawa, M., Li, J., Chang, K. (eds.) PAKDD 2006. LNCS (LNAI), vol. 3918, pp. 647–656. Springer, Heidelberg (2006). https://doi.org/10.1007/11731139_74

    Chapter  Google Scholar 

  19. Yu, H., Jiang, X., Vaidya, J.: Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data. In: SAC 2006, pp. 603–610 (2006)

    Google Scholar 

  20. Zhang, J., Wang, X., Yiu, S.M., Jiang, Z.L., Li, J.: Secure dot product of outsourced encrypted vectors and its application to SVM. In: SCC\(@\)AsiaCCS 2017, pp. 75–82 (2017)

    Google Scholar 

  21. Yu, A., Lai, W.L., Payor, J.: Efficient integer vector homomorphic encryption (2015). https://courses.csail.mit.edu/6.857/2015/files/yu-lai-payor.pdf

  22. Zhou, H., Wornell, G.W.: Efficient homomorphic encryption on integer vectors and its applications. In: ITA 2014, pp. 1–9 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sabyasachi Dutta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dutta, S., Nikam, N., Ruj, S. (2018). Secure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to SVM. In: Su, C., Kikuchi, H. (eds) Information Security Practice and Experience. ISPEC 2018. Lecture Notes in Computer Science(), vol 11125. Springer, Cham. https://doi.org/10.1007/978-3-319-99807-7_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-99807-7_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-99806-0

  • Online ISBN: 978-3-319-99807-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics