Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Zhang, Jun | He, Meiqi | Zeng, Gongxian | Yiu, Siu-Ming; *
Affiliations: Department of Computer Science, The University of Hong Kong, Pokfulam Road, Hong Kong. E-mails: [email protected], [email protected], [email protected], [email protected]
Correspondence: [*] Corresponding author. E-mail: [email protected].
Abstract: With the popularity of cloud computing, an increasing number of institutions outsource their data to a third-party cloud system which could be untrusted. The institutions encrypt their data before outsourcing to protect data privacy. On the other hand, data mining techniques are used widely but computationally intensive, especially for large datasets. Combining data from different institutions for a big and varied training set helps enhance data mining performance. Therefore, it is important to make the cloud system which has powerful computing abilities run data mining algorithms on the encrypted data from multiple institutions. Two challenges need attention – how to compute on encrypted data under multiple keys and how to verify the correctness of the result. There are no existing methods that solve the two challenges at the same time. Elastic net is a useful linear regression tool to find genomic biomarkers. In this paper, we propose the first privacy-preserving verifiable elastic net protocol based on reduction to support vector machine using two non-colluding servers. We construct a homomorphic cryptosystem that supports one multiply operation and multiple add operations under both single key and different keys. We allow the involved institutions to verify the correctness of the final result. The collaboration between multiple institutions is made possible without jeopardizing the privacy of data records. We formally prove that our protocol is secure and implement the protocol. The experimental results show that our protocol runs reasonably fast, and thus can be applied in practice.
Keywords: Privacy-preserving elastic net, support vector machine, verifiable computation, multiple encryption keys
DOI: 10.3233/JCS-171107
Journal: Journal of Computer Security, vol. 26, no. 6, pp. 791-815, 2018
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]