Encrypted SVM for Outsourced Data Mining

Individuals and companies, taking advantage of cloud computing which affords both resource and compute scalability, are willing to outsource their exploding data to save the storage and managing cost, however, users often do not fully trust the cloud and therefore outsource their private data after encryption to protect the data privacy. Here, as the data are both encrypted and outsourced in the cloud, how to securely and efficiently store and process such data becomes a challenging task and a primary concern. Support vector machine (SVM) classification, among different data mining and machine learning algorithms, has been very widely used in practical applications, which however, does not have a corresponding solution for such outsourced and encrypted data. Also, existing secure methods only assume that the data is locally stored by users rather than outsourced. To address this problem, we propose a novel Protocol for Outsourced SVM (POS) in this paper. POS lets cloud and users perform collaborative operations on encrypted and outsourced data without violating the data privacy contributed by each user. We formally verified that POS is correct and secure. We also conducted experimental analysis.

[1]  Jaideep Vaidya,et al.  Privacy-Preserving SVM Classification on Vertically Partitioned Data , 2006, PAKDD.

[2]  Li Wan,et al.  Privacy-preservation for gradient descent methods , 2007, KDD '07.

[3]  Barbara Carminati,et al.  Privacy in Social Networks: How Risky is Your Social Graph? , 2012, 2012 IEEE 28th International Conference on Data Engineering.

[4]  Geoffrey C. Fox,et al.  A Scalable Approach for the Secure and Authorized Tracking of the Availability of Entities in Distributed Systems , 2007, 2007 IEEE International Parallel and Distributed Processing Symposium.

[5]  Gu Si-yang,et al.  Privacy preserving association rule mining in vertically partitioned data , 2006 .

[6]  Kyle Chard,et al.  Social Cloud Computing: A Vision for Socially Motivated Resource Sharing , 2012, IEEE Transactions on Services Computing.

[7]  George Karypis,et al.  Profile-based direct kernels for remote homology detection and fold recognition , 2005, Bioinform..

[8]  Taneli Mielikäinen,et al.  Cryptographically private support vector machines , 2006, KDD '06.

[9]  Li Wan,et al.  Privacy-Preserving Gradient-Descent Methods , 2010, IEEE Transactions on Knowledge and Data Engineering.

[10]  Jian Pei,et al.  Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[11]  Jaideep Vaidya,et al.  Knowledge and Information Systems , 2007 .

[12]  Frederik Vercauteren,et al.  Fully homomorphic SIMD operations , 2012, Designs, Codes and Cryptography.

[13]  Rebecca N. Wright,et al.  Privacy-preserving distributed k-means clustering over arbitrarily partitioned data , 2005, KDD '05.

[14]  Wei Zhang,et al.  Encrypted Scalar Product Protocol for Outsourced Data Mining , 2014, 2014 IEEE 7th International Conference on Cloud Computing.

[15]  Beng Chin Ooi,et al.  Privacy and ownership preserving of outsourced medical data , 2005, 21st International Conference on Data Engineering (ICDE'05).

[16]  Masahiro Yagisawa,et al.  Fully Homomorphic Encryption without bootstrapping , 2015, IACR Cryptol. ePrint Arch..

[17]  Craig Gentry,et al.  Homomorphic Evaluation of the AES Circuit , 2012, IACR Cryptol. ePrint Arch..

[18]  Craig Gentry,et al.  (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.

[19]  Wei Zhang,et al.  Encrypted Set Intersection Protocol for Outsourced Datasets , 2014, 2014 IEEE International Conference on Cloud Engineering.

[20]  Balachander Krishnamurthy,et al.  Privacy in dynamic social networks , 2010, WWW '10.

[21]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[22]  Philip S. Yu,et al.  Privacy-preserving social network publication against friendship attacks , 2011, KDD.

[23]  Xuelong Li,et al.  Asymmetric bagging and random subspace for support vector machines-based relevance feedback in image retrieval , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[24]  Jaideep Vaidya,et al.  Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data , 2006, SAC.

[25]  Tubagus Mohammad Akhriza SECURE KNOWLEDGE MANAGEMENT: CONFIDENTIALITY, TRUST AND PRIVACY , 2010 .