Encrypted Gradient Descent Protocol for Outsourced Data Mining

With the push of cloud computing which has both resource and compute scalability, data, which has been exploding in the past years, are often outsourced to a server. To this end, secure and efficient data processing and mining on outsourced private database becomes a primary concern for users. Among different secure data mining and machine learning algorithms, gradient descent method, as a widely used optimization paradigm, aims at approximating a target function to reach a local minimum, which is always deemed as a decision model to be discovered. In existing methods, users are assumed to hold and process their own data, and all users follow a secure protocol to perform gradient descent algorithm. However, such methods are not applicable to a cloud platform since that data is outsourced to a centralized server after encryption. To address this problem, we propose an Encrypted Gradient Descent Protocol (EGDP) in this paper. In EGDP, both users and server perform collaborative operations to learn and approximate the target function without violating data privacy. We formally proved that EGDP is secure and can return correct result.

[1]  Li Wan,et al.  Privacy-preservation for gradient descent methods , 2007, KDD '07.

[2]  Balachander Krishnamurthy,et al.  Privacy in dynamic social networks , 2010, WWW '10.

[3]  Jaideep Vaidya,et al.  Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data , 2006, SAC.

[4]  Bobby Bhattacharjee,et al.  Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.

[5]  Barbara Carminati,et al.  Privacy in Social Networks: How Risky is Your Social Graph? , 2012, 2012 IEEE 28th International Conference on Data Engineering.

[6]  Anders Krogh,et al.  Introduction to the theory of neural computation , 1994, The advanced book program.

[7]  Elisa Bertino,et al.  Secure knowledge management: confidentiality, trust, and privacy , 2006, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[8]  Kyle Chard,et al.  Social Cloud Computing: A Vision for Socially Motivated Resource Sharing , 2012, IEEE Transactions on Services Computing.

[9]  Wei Zhang,et al.  Encrypted Set Intersection Protocol for Outsourced Datasets , 2014, 2014 IEEE International Conference on Cloud Engineering.

[10]  Martin Gilje Jaatun,et al.  Reference deployment models for eliminating user concerns on cloud security , 2010, The Journal of Supercomputing.

[11]  Beng Chin Ooi,et al.  Privacy and ownership preserving of outsourced medical data , 2005, 21st International Conference on Data Engineering (ICDE'05).

[12]  Donald Metzler Using gradient descent to optimize language modeling smoothing parameters , 2007, SIGIR.

[13]  Gu Si-yang,et al.  Privacy preserving association rule mining in vertically partitioned data , 2006 .

[14]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[15]  Andrew W. Moore,et al.  Gradient Descent for General Reinforcement Learning , 1998, NIPS.

[16]  Geoffrey C. Fox,et al.  A Scalable Approach for the Secure and Authorized Tracking of the Availability of Entities in Distributed Systems , 2007, 2007 IEEE International Parallel and Distributed Processing Symposium.

[17]  Li Wan,et al.  Privacy-Preserving Gradient-Descent Methods , 2010, IEEE Transactions on Knowledge and Data Engineering.

[18]  Patrick Shen-Pei Wang,et al.  3D object perception using gradient descent , 1995, Journal of Mathematical Imaging and Vision.

[19]  Philip S. Yu,et al.  Privacy-preserving social network publication against friendship attacks , 2011, KDD.

[20]  Rong Jin,et al.  A Random Matrix Approach to Differential Privacy and Structure Preserved Social Network Graph Publishing , 2013, ArXiv.

[21]  Rebecca N. Wright,et al.  Privacy-preserving distributed k-means clustering over arbitrarily partitioned data , 2005, KDD '05.

[22]  Thomas G. Dietterich What is machine learning? , 2020, Archives of Disease in Childhood.

[23]  Wei Zhang,et al.  Encrypted Scalar Product Protocol for Outsourced Data Mining , 2014, 2014 IEEE 7th International Conference on Cloud Computing.