Skip to main content

A Review of Privacy-Preserving Machine Learning Classification

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11066))

Included in the following conference series:

Abstract

Machine Learning (ML) Classification has already become one of the most commonly used techniques in many areas such as banking, medicine, spam detection and data mining applications. Often, the training of models require massive data which may contain sensitive information and the classification phase may expose the train models and the inputs from the users. Neither the models nor the train datasets and inputs should expose private information. Addressing this goal, several schemes have been proposed for privacy preserving classification. In this paper, we review those privacy preserving techiniques which applied for different machine learning classification algorithms. These algorithms conclude k-NN, SVM, Bayesian, neural networks, decision tree and etc. we sum up the comparison protocols. Finally, this work comes up with some correlative problems which are worthy to study in the future.

Supported by Fundamental Research Funds for the Central Universities (N171704005) and Shenyang Science and Technology Plan Projects (18-013-0-01).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Drucker, H., Wu, D., Vapnik, V.N.: Support vector machines for spam categorization. IEEE Trans. Neural Netw. 10(5), 1048–54 (1999)

    Article  Google Scholar 

  2. Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems, vol. 2, pp. 1097–1105, Lake Tahoe, NV, United states (2012)

    Google Scholar 

  3. Kaufman, D.J., Murphy-Bollinger, J., Scott, J., Hudson, K.L.: Public opinion about the importance of privacy in biobank research. Am. J. Hum. Genet. 85(5), 643–654 (2009)

    Article  Google Scholar 

  4. Liu, F., Ng, W.K., Zhang, W.: Encrypted SVM for outsourced data mining. In: IEEE International Conference on Cloud Computing, pp. 1085–1092 (2015)

    Google Scholar 

  5. Samanthula, B.K., Elmehdwi, Y., Jiang, W.: k-nearest neighbor classification over semantically secure encrypted relational data. IEEE Trans. Knowl. Data Eng. 27(5), 1261–1273 (2015)

    Article  Google Scholar 

  6. Barthe, G., et al.: Differentially private Bayesian programming. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 68–79 (2016)

    Google Scholar 

  7. Dou, J.W., Liu, X.H., Zhou, S.F., Li, S.D.: Efficient secure multi-party computation protocol and application over set (2018)

    Google Scholar 

  8. Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3–4), 211–407 (2014). http://dx.doi.org/10.1561/0400000042

    MathSciNet  MATH  Google Scholar 

  9. Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-79228-4_1

    Chapter  MATH  Google Scholar 

  10. Dwork, C., Rothblum, G.N., Vadhan, S.: Boosting and differential privacy, pp. 51–60, Las Vegas, NV, United states (2010). http://dx.doi.org/10.1109/FOCS.2010.12

  11. Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006). https://doi.org/10.1007/11681878_14

    Chapter  Google Scholar 

  12. Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). https://doi.org/10.1007/11787006_1

    Chapter  Google Scholar 

  13. Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the ACM Conference on Computer and Communications Security, vol. 24–28, pp. 308–318, Vienna, Austria (2016)

    Google Scholar 

  14. Abadi, M., Agarwal, A., Barham, P., Brevdo, E., et al.: Tensorflow: large-scale machine learning on heterogeneous distributed systems (2016)

    Google Scholar 

  15. Johnson, R., Zhang, T.: Accelerating stochastic gradient descent using predictive variance reduction. In: Advances in Neural Information Processing Systems, pp. 315–323, Lake Tahoe, NV, United states (2013)

    Google Scholar 

  16. Duchi, J., Hazan, E., Singer, Y.: Adaptive subgradient methods for online learning and stochastic optimization. J. Mach. Learn. Res. 12, 2121–2159 (2011)

    MathSciNet  MATH  Google Scholar 

  17. Chaudhuri, K., Monteleoni, C., Sarwate, A.D.: Differentially private empirical risk minimization. J. Mach. Learn. Res. 12, 1069–1109 (2011)

    MathSciNet  MATH  Google Scholar 

  18. Hardt, M., Ligett, K., McSherry, F.: A simple and practical algorithm for differentially private data release. In: Conference on Neural Information Processing Systems 2012, NIPS 2012, vol. 3, pp. 2339–2347, Lake Tahoe, NV, United states (2012)

    Google Scholar 

  19. Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. In: Foundations of Secure Computation, pp. 169–179 (1978)

    Google Scholar 

  20. Rivest, R., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  Google Scholar 

  21. Goldwasser, S., Micali, S.: Probabilistic encryption & how to play mental poker keeping secret all partial information. In: Fourteenth ACM Symposium on Theory of Computing, pp. 365–377 (1982)

    Google Scholar 

  22. ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 469–472 (1985)

    Article  MathSciNet  Google Scholar 

  23. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48910-X_16

    Chapter  Google Scholar 

  24. Gentry, C.: A fully homomorphic encryption scheme. Stanford University (2009). http://crypto.stanford.edu/craig

  25. Aslett, L., Esperanca, P., Holmes, C.: A review of homomorphic encryption and software tools for encrypted statistical machine learning. Computer Science (2015)

    Google Scholar 

  26. Yu, H., Jiang, X., Vaidya, J.: Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data. In: ACM Symposium on Applied Computing, pp. 603–610 (2006)

    Google Scholar 

  27. Yu, H., Vaidya, J., Jiang, X.: Privacy-preserving SVM classification on vertically partitioned data. In: Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, pp. 647–656 (2006)

    Google Scholar 

  28. Laur, S., Lipmaa, H.: Cryptographically private support vector machines. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 618–624 (2006)

    Google Scholar 

  29. Li, P., Li, J., Huang, Z., Li, T., Gao, C.Z., Yiu, S.M., Chen, K.: Multi-key privacy-preserving deep learning in cloud computing. Futur. Gener. Comput. Syst. 74, 76–85 (2017)

    Article  Google Scholar 

  30. Yao, A.C.: Protocols for secure computations. In: Symposium on Foundations of Computer Science, pp. 160–164 (1982)

    Google Scholar 

  31. Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay-a secure two-party computation system. In: Conference on USENIX Security Symposium, pp. 287–302 (2004)

    Google Scholar 

  32. Ben-David, A., Nisan, N., Pinkast, B.: Fairplaymp - a system for secure multi-party computation, pp. 257–266, Alexandria, VA, United states (2008)

    Google Scholar 

  33. Henecka, W., Kogl, S., Sadeghi, A.R., Schneider, T., Wehrenberg, I.: Tasty: tool for automating secure two-party computations, pp. 451–462, Chicago, IL, United states (2010)

    Google Scholar 

  34. Bost, R., Popa, R.A., Tu, S., Goldwasser, S.: Machine learning classification over encrypted data. In: Network and Distributed System Security Symposium (2015)

    Google Scholar 

  35. Jakobsen, T.P., Nielsen, J.B., Orlandi, C.: A framework for outsourcing of secure computation. In: 2014 ACM Cloud Computing Security Workshop, CCS 2014, pp. 81–92, Scottsdale, AZ, United states (2014). https://doi.org/10.1145/2664168.266417

  36. Asharov, G., Jain, A., López-Alt, A., Tromer, E., Vaikuntanathan, V., Wichs, D.: Multiparty computation with low communication, computation and interaction via threshold FHE. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 483–501. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29011-4_29

    Chapter  Google Scholar 

  37. Jiang, L.Z., Xu, C.X., Wang, X.F., Chem, K.F., Wang, B.C.: The application of (fully) homomorphic encryption on ciphertext-based computational model. J. Cryptogr. (6) (2017)

    Google Scholar 

  38. Tai, R.K.H., Ma, J.P.K., Zhao, Y., Chow, S.S.M.: Privacy-preserving decision trees evaluation via linear functions. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 494–512. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66399-9_27

    Chapter  Google Scholar 

  39. Veugen, T.: Comparing encrypted data (2011). http://siplab.tudelft.nl/sites/default/files/Comparing%20encrypted%20data.pdf

Download references

Acknowledgements

Supported by the National Natural Science Foundation of China (61872069), Fundamental Research Funds for the Central Universities (N171704005) and Shenyang Science and Technology Plan Projects (18-013-0-01).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, A., Wang, C., Bi, M., Xu, J. (2018). A Review of Privacy-Preserving Machine Learning Classification. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11066. Springer, Cham. https://doi.org/10.1007/978-3-030-00015-8_58

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00015-8_58

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00014-1

  • Online ISBN: 978-3-030-00015-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics