Privacy-Preserving Minority Oversampling Protocols with Fully Homomorphic Encryption
نویسندگان
چکیده
In recent years, blockchain and machine-learning techniques have received increasing attention both in theoretical practical aspects. However, the applications of these many challenges, one which is privacy-preserving issue. this paper, we focus on, specifically, issue imbalanced datasets, a commonly found problem real-world applications. Built based on fully homomorphic encryption technique, paper presents two new secure protocols, Privacy-Preserving Synthetic Minority Oversampling Protocol (PPSMOS) Borderline (Borderline-PPSMOS). Our analysis reveals that PPSMOS generally more efficient performance than Borderline-PPSMOS. Borderline-PPSMOS achieves better TP rate F-Value PPSMOS.
منابع مشابه
Cloud Auditing: Privacy Preserving using Fully Homomorphic Encryption in TPA
Cloud computing is the future of the next generation architecture of IT solutions. Cloud provides computing resources on subscription basis over the internet. The Cloud data storage network includes a Third Party Auditor which has the power and capabilities that a client does not have. It is a trusted entity that has the access to, other than cloud and check on the exposed risk involved in clou...
متن کاملPrivacy Preserving using Homomorphic Encryption
In the recent time, privacy preserving has been studied extensively, because of the extensive explosion of sensitive information. Privacy preserving is one of the important areas that aim to provide security for secret information from unsolicited or unsanctioned disclosure. This has triggered the development of much privacy preserving technique using encryption algorithm. This work will presen...
متن کاملPrivacy preserving biometrics using partially homomorphic encryption
We will look into privacy preserving biometrics using the example of a fingerprint reader and partially homomorphic encryption. Therefore we will cover the basics necessary to understand the discussed subject, partially homomorphic encryption and fingerprint based authentication, as well as showing a concrete protocol and its implications on performance and security of the system. While securit...
متن کاملPrivacy preserving record linkage using homomorphic encryption
The bloom filter method for privacy preserving record linkage [24] has been shown to be both efficient, and provide equivalent linkage quality to that achievable with unencoded identifiers [23]. However in some situations, the bloom filter method may be vulnerable to frequency attacks, which could potentially leak identifying information [18]. In this paper we extend the bloom filter protocol t...
متن کاملThe Use of Fully Homomorphic Encryption in Data Mining with Privacy Preserving
Data mining is a computational tool widely used today which aims to extract useful information from various databases. Nowadays with the large volume of information that is produced, stored in a remote database (using cloud computing), concerns about confidentiality and privacy of information are arising due to lack of guaranteed security by storage service and the mining algorithm. A new appro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2022
ISSN: ['1939-0122', '1939-0114']
DOI: https://doi.org/10.1155/2022/3068199