Experimental analysis of a privacy-preserving scalar product protocol

نویسندگان

  • Zhiqiang Yang
  • Rebecca N. Wright
  • Hiranmayee Subramaniam
چکیده

The recent investigation of privacy-preserving data mining has been motivated by the growing concern about the privacy of individuals when their data is stored, aggregated, and mined for information. In an effort towards practical algorithms for privacy-preserving data mining solutions, we analyze and implement solutions to an important primitive: the privacy-preserving scalar product of two vectors held by different parties. Privacypreserving scalar products are an important component of privacy-preserving data mining algorithms, particularly when data is vertically partitioned between two or more parties. We examine a cryptographically secure privacypreserving data mining solution in different computational settings. Our experimental results show that in the absence of special-purpose hardware accelerators or practical optimizations, the computational complexity, rather than the communication complexity, is the performance bottleneck. We also evaluate several practical optimizations to improve the effi-

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient scalar product protocol and its privacy-preserving application

Scalar product protocol aims at securely computing the dot product of two private vectors. As a basic tool, the protocol has been widely used in privacy preserving distributed collaborative computations. In this paper, at the expense of disclosing partial sum of some private data, we propose a linearly efficient even-dimension scalar product protocol (EDSPP) without employing expensive homomorp...

متن کامل

A New Efficient Privacy-Preserving Scalar Product Protocol

Recently, privacy issues have become important in data analysis, especially when data is horizontally partitioned over several parties. In data mining, the data is typically represented as attribute-vectors and, for many applications, the scalar (dot) product is one of the fundamental operations that is repeatedly used. In privacy-preserving data mining, data is distributed across several parti...

متن کامل

A Secure Scalar Product Protocol and Its Applications to Computational Geometry

A secure scalar product protocol is a type of specific SMC problem, and has found various applications in many areas such as privacy-preserving data mining, privacy-preserving cooperative statistical analysis, and privacy-preserving geometry computation. In this paper, we firstly extend to a solution of homomorphic-encryption based secure scalar product protocol such that it enables the scheme ...

متن کامل

On Private Scalar Product Computation for Privacy-Preserving Data Mining

In mining and integrating data from multiple sources, there are many privacy and security issues. In several different contexts, the security of the full privacy-preserving data mining protocol depends on the security of the underlying private scalar product protocol. We show that two of the private scalar product protocols, one of which was proposed in a leading data mining conference, are ins...

متن کامل

Multi-Party Privacy-Preserving Decision Trees for Arbitrarily Partitioned Data

Privacy-preserving data mining seeks to empower conventional data mining techniques with the desirable property of preserving data privacy during the mining process. Given existing approaches on privacy-preserving decision tree induction for horizontally and vertically partitioned data involving multiple parties, we extend current work to multiple parties holding arbitrarily partitioned data. A...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Comput. Syst. Sci. Eng.

دوره 21  شماره 

صفحات  -

تاریخ انتشار 2006