Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3433210.3453105acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Horizontal Privacy-Preserving Linear Regression Which is Highly Efficient for Dataset of Low Dimension

Published: 04 June 2021 Publication History

Abstract

Linear regression is a widely used machine learning model for applications such as personalized health-care prediction, recommendation systems, and policy making etc. Nowadays one important trend of applying this model (also others) is privacy-preserving linear regression, in which multiple parties, each possessing a part of dataset, jointly perform the learning process, while paying a specific attention to the goal of preserving privacy of their data. Consequently some works on how to achieve this goal with various properties appear in recent years.
In this paper, we present a new privacy-preserving linear regression protocol for the scenario where dataset is distributed horizontally, which works highly efficiently in particular when training dataset is of low dimension. Our protocol uses two non-colluding servers, in which multiple data providers share their private data, i.e. a dxd matrix where d denotes the dimension of dataset, into two shares and send shares to the two servers respectively which then jointly perform the training process securely.
Our technical novelties are as follows. We remark that in the method of solving linear systems (SLS), one mainstream method for linear regression (while the other one is stochastic gradient descent (SGD)), the time complexity only depends on the dimension, regardless of the number of samples. Note that known works using SLS employ garbled circuits for entire linear systems and thus use heavy computation. We implement SLS via the share-computation method which is known for securely implementing SGD and has not been applied to SLS to our knowledge, and thus inherit the advantages from them both (note that SLS admits fast computation when dataset is of low dimension, and the share-computation method is faster than the method of garbled circuits for entire linear systems).
In the share-computation for SLS we propose a hybrid method, combining garbled circuits and secret sharing, to realize a secure and round-efficient division for fixed-point number (8+2θ rounds, where θ is a small number of iterations and is set to 5 in our experiment). We then use the division protocol to implement our new protocol for linear regression. As a consequence, our protocol is highly efficient for dataset of low dimension. We implement our protocol in C++ and the experiments show that our protocol is much more efficient than the state of the art implementations for privacy-preserving linear regression for dataset of low dimension.

References

[1]
Adi Akavia, Hayim Shaul, Mor Weiss, and Zohar Yakhini. 2019. Linear-Regression on Packed Encrypted Data in the Two-Server Model.IACR Cryptol. ePrint Arch. 2019 (2019), 1238. https://eprint.iacr.org/2019/1238
[2]
Gilad Asharov, Yehuda Lindell, Thomas Schneider, and Michael Zohner. 2017. More Efficient Oblivious Transfer Extensions. J. Cryptol. 30, 3 (2017), 805--858.
[3]
Manuel Barbosa, Dario Catalano, and Dario Fiore. 2017. Labeled Homomorphic Encryption - Scalable and Privacy-Preserving Processing of Outsourced Data. In Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11--15, 2017, Proceedings, Part I(Lecture Notes in Computer Science), Simon N. Foley, Dieter Gollmann, and Einar Snekkenes (Eds.), Vol. 10492. Springer, 146--166.
[4]
Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, and Phillip Rogaway. 2013. Efficient Garbling from a Fixed-Key Blockcipher. IACR Cryptol. ePrint Arch.2013(2013), 426.http://eprint.iacr.org/2013/426
[5]
George Robert Blakley. 1979. Safeguarding cryptographic keys. In 1979 International Workshop on Managing Requirements Knowledge (MARK). IEEE, 313--318.
[6]
Ran Canetti. 2001. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In 42nd Annual Symposium on Foundations of Computer Science, FOCS 2001, 14--17 October 2001, Las Vegas, Nevada, USA. IEEE Computer Society, 136--145. https://doi.org/10.1109/SFCS.2001.959888
[7]
Octavian Catrina. 2018. Round-efficient protocols for secure multiparty fixed-point arithmetic. In 2018 International Conference on Communications (COMM). IEEE, 431--436.
[8]
Octavian Catrina and Sebastiaan de Hoogh. 2010. Improved Primitives for Secure Multiparty Integer Computation. In Security and Cryptography for Networks, 7th International Conference, SCN 2010, Amalfi, Italy, September 13--15, 2010. Proceedings (Lecture Notes in Computer Science), Juan A. Garay and Roberto DePrisco (Eds.), Vol. 6280. Springer, 182--199.
[9]
Octavian Catrina and Sebastiaan de Hoogh. 2010. Secure Multiparty Linear Programming Using Fixed-Point Arithmetic. In Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20--22, 2010. Proceedings (Lecture Notes in Computer Science), Dimitris Gritzalis, Bart Preneel, and Marianthi Theoharidou (Eds.), Vol. 6345. Springer, 134--150. https://doi.org/10.1007/978--3--642--15497--3_9
[10]
Daniel Demmler, Thomas Schneider, and Michael Zohner. 2015. ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. In 22nd An-nual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, February 8--11, 2015. The Internet Society.
[11]
Milo D. Ercegovac and Toms Lang. 2003.Digital Arithmetic(1st ed.). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.
[12]
Adrià Gascón, Phillipp Schoppmann, Borja Balle, Mariana Raykova, Jack Doerner, Samee Zahur, and David Evans. 2017. Privacy-Preserving Distributed Linear Regression on High-Dimensional Data. Proc. Priv. Enhancing Technol. 2017, 4 (2017), 345--364. https://doi.org/10.1515/popets-2017-0053
[13]
Irene Giacomelli, Somesh Jha, Marc Joye, C. David Page, and Kyonghwan Yoon.2018. Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption. In Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Leuven, Belgium, July 2--4, 2018, Proceedings (Lecture Notes in Computer Science), Bart Preneel and Frederik Vercauteren (Eds.),Vol. 10892. Springer, 243--261. https://doi.org/10.1007/978--3--319--93387-0_13
[14]
Oded Goldreich. 2004. The Foundations of Cryptography - Volume 2: Basic Applications. Cambridge University Press. https://doi.org/10.1017/CBO9780511721656
[15]
Trevor Hastie, Robert Tibshirani, and Jerome Friedman. 2009. The elements of statistical learning: data mining, inference and prediction(2 ed.). Springer. http://www-stat.stanford.edu/~tibs/ElemStatLearn/
[16]
Keitaro Hiwatashi, Satsuya Ohata, and Koji Nuida. 2020. An Efficient Secure Di-vision Protocol Using Approximate Multi-bit Product and New Constant-Round Building Blocks. In Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Rome, Italy, October 19--22, 2020, Proceedings, Part I (Lecture Notes in Computer Science), Mauro Conti, Jianying Zhou, Emiliano Casalicchio, and Angelo Spognardi (Eds.), Vol. 12146. Springer, 357--376.
[17]
Vladimir Kolesnikov and Thomas Schneider. 2008. Improved Garbled Circuit: Free XOR Gates and Applications. In Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7--11, 2008,Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations (Lecture Notes in Computer Science), Luca Aceto, Ivan Damgard, Leslie Ann Goldberg, Magnús M. Halldórsson, Anna Ingolfsdottir, and Igor Walukiewicz (Eds.), Vol. 5126. Springer, 486--498.
[18]
M. Lichman. 2013 (accessed December 11, 2020). UCI machine learning repository. https://archive.ics.uci.edu/ml/datasets.php.
[19]
Yehuda Lindell and Benny Pinkas. 2009. A Proof of Security of Yao's Protocol for Two-Party Computation. J. Cryptol. 22, 2 (2009), 161--188.
[20]
Peter Markstein. 2004. Software Division and Square Root Using Goldschmidt's Algorithm. In 6th Conference on Real Numbers and Computes. 146--157.
[21]
Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Artificial Intelligence and Statistics. 1273--1282.
[22]
H. Brendan McMahan, Eider Moore, Daniel Ramage, and Blaise Agüera y Arcas. 2016. Federated Learning of Deep Networks using Model Averaging. CoRRabs/1602.05629 (2016). arXiv:1602.05629
[23]
Payman Mohassel and Peter Rindal. 2018. ABY3: A Mixed Protocol Framework for Machine Learning. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15--19, 2018, David Lie, Mohammad Mannan, Michael Backes, and Xiao Feng Wang (Eds.). ACM, 35--52.https://doi.org/10.1145/3243734.3243760
[24]
Payman Mohassel and Yupeng Zhang. 2017. SecureML: A System for Scalable Privacy-Preserving Machine Learning. In 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22--26, 2017. IEEE Computer Society, 19--38. https://doi.org/10.1109/SP.2017.12
[25]
Hiraku Morita, Nuttapong Attrapadung, Satsuya Ohata, Koji Nuida, Shota Yamada, Kana Shimizu, Goichiro Hanaoka, and Kiyoshi Asai. 2018. Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests. In International Symposium on Information Theory and Its Applications, ISITA 2018,Singapore, October 28--31, 2018. IEEE, 530--534.
[26]
Kevin P. Murphy. 2012. Machine learning : a probabilistic perspective. The MIT Press.
[27]
Valeria Nikolaenko, Udi Weinsberg, Stratis Ioannidis, Marc Joye, Dan Boneh, and Nina Taft. 2013. Privacy-Preserving Ridge Regression on Hundreds of Millions of Records. In2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley,CA, USA, May 19--22, 2013. IEEE Computer Society, 334--348. https://doi.org/10.1109/SP.2013.30
[28]
Pascal Paillier. 1999. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2--6, 1999, Proceeding (Lecture Notes in Computer Science), Jacques Stern (Ed.), Vol. 1592. Springer, 223--238.
[29]
Chris Peikert, Vinod Vaikuntanathan, and Brent Waters. 2008. A Framework for Efficient and Composable Oblivious Transfer. In Advances in Cryptology -CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17--21, 2008. Proceedings (Lecture Notes in Computer Science), David A. Wagner (Ed.), Vol. 5157. Springer, 554--571.
[30]
Adi Shamir. 1979. How to Share a Secret.Commun. ACM22, 11 (1979), 612--613.
[31]
Qiang Yang, Yang Liu, Tianjian Chen, and Yongxin Tong. 2019. Federated Ma-chine Learning: Concept and Applications. ACM Trans. Intell. Syst. Technol. 10, 2 (2019), 12:1--12:19. https://doi.org/10.1145/3298981
[32]
Andrew Chi-Chih Yao. 1982. Protocols for Secure Computations (Extended Abstract). In 23rd Annual Symposium on Foundations of Computer Science, Chicago, Illinois, USA, 3--5 November 1982. IEEE Computer Society, 160--164.
[33]
Samee Zahur, Mike Rosulek, and David Evans. 2015. Two Halves Make a Whole-Reducing Data Transfer in Garbled Circuits Using Half Gates. In Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, Part II (Lecture Notes in Computer Science), Vol. 9057. Springer, 220--250.

Cited By

View all
  • (2023)Optimizing Secure Decision Tree Inference OutsourcingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.319404820:4(3079-3092)Online publication date: 1-Jul-2023

Index Terms

  1. Horizontal Privacy-Preserving Linear Regression Which is Highly Efficient for Dataset of Low Dimension

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security
    May 2021
    975 pages
    ISBN:9781450382878
    DOI:10.1145/3433210
    • General Chairs:
    • Jiannong Cao,
    • Man Ho Au,
    • Program Chairs:
    • Zhiqiang Lin,
    • Moti Yung
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 June 2021

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. horizontal dataset
    2. linear regression
    3. low dimension
    4. matrix decomposition
    5. privacy-preserving

    Qualifiers

    • Research-article

    Conference

    ASIA CCS '21
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 418 of 2,322 submissions, 18%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)21
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 28 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Optimizing Secure Decision Tree Inference OutsourcingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.319404820:4(3079-3092)Online publication date: 1-Jul-2023

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media