Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud

被引:151
作者
Rahulamathavan, Yogachandran [1 ]
Phan, Raphael C. -W. [2 ]
Veluru, Suresh [1 ]
Cumanan, Kanapathippillai [3 ]
Rajarajan, Muttukrishnan [1 ]
机构
[1] City Univ London, Sch Engn & Math Sci, London EC1V 0HB, England
[2] Multimedia Univ, Fac Engn, Cyberjaya 63100, Malaysia
[3] Newcastle Univ, Sch Elect & Elect Engn, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, England
基金
英国工程与自然科学研究理事会;
关键词
Privacy; data classification; cloud computing; support vector machine; homomorphic encryption; RECOGNITION;
D O I
10.1109/TDSC.2013.51
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
080201 [机械制造及其自动化];
摘要
Emerging cloud computing infrastructure replaces traditional outsourcing techniques and provides flexible services to clients at different locations via Internet. This leads to the requirement for data classification to be performed by potentially untrusted servers in the cloud. Within this context, classifier built by the server can be utilized by clients in order to classify their own data samples over the cloud. In this paper, we study a privacy-preserving (PP) data classification technique where the server is unable to learn any knowledge about clients' input data samples while the server side classifier is also kept secret from the clients during the classification process. More specifically, to the best of our knowledge, we propose the first known client-server data classification protocol using support vector machine. The proposed protocol performs PP classification for both two-class and multi-class problems. The protocol exploits properties of Pailler homomorphic encryption and secure two-party computation. At the core of our protocol lies an efficient, novel protocol for securely obtaining the sign of Pailler encrypted numbers.
引用
收藏
页码:467 / 479
页数:13
相关论文
共 39 条
[1]
Barni M., 2006, P ACM MULT SEC WORKS
[2]
Privacy-Preserving ECG Classification With Branching Programs and Neural Networks [J].
Barni, Mauro ;
Failla, Picrluigi ;
Lazzeretti, Riccardo ;
Sadeghi, Ahmad-Reza ;
Schneider, Thomas .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (02) :452-468
[3]
Barni M, 2010, MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, P231
[4]
Support Vector Machines and Kernels for Computational Biology [J].
Ben-Hur, Asa ;
Ong, Cheng Soon ;
Sonnenburg, Soeren ;
Schoelkopf, Bernhard ;
Raetsch, Gunnar .
PLOS COMPUTATIONAL BIOLOGY, 2008, 4 (10)
[5]
Bergsma S., 2010, P CONLL, P172
[6]
Boser B. E., 1992, Proceedings of the Fifth Annual ACM Workshop on Computational Learning Theory, P144, DOI 10.1145/130385.130401
[7]
A tutorial on Support Vector Machines for pattern recognition [J].
Burges, CJC .
DATA MINING AND KNOWLEDGE DISCOVERY, 1998, 2 (02) :121-167
[8]
Efficient leave-one-out cross-validation of kernel Fisher discriminant classifiers [J].
Cawley, GC ;
Talbot, NLC .
PATTERN RECOGNITION, 2003, 36 (11) :2585-2592
[9]
Chen KK, 2005, Fifth IEEE International Conference on Data Mining, Proceedings, P589
[10]
SUPPORT-VECTOR NETWORKS [J].
CORTES, C ;
VAPNIK, V .
MACHINE LEARNING, 1995, 20 (03) :273-297