Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 6/2020

05.10.2020

Efficient distributed privacy-preserving collaborative outlier detection

verfasst von: Zhaohui Wei, Qingqi Pei, Xuefeng Liu, Lichuan Ma

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 6/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As a common way to identify anomalous data, outlier detection is widely applicable for intrusions detection, adverse reactions analysis, financial fraud prevention, etc. The accuracy of outlier detection depends crucially on the number of data involved in the test, i.e., the more data participate in detection, the higher accuracy we get. For this reason, cross-dataset collaborative outlier detection is introduced to conquer the lack of data in a single-dataset setting. However, privacy concerns seriously prevent the application of collaborative outlier detection, since most organization are unwilling to share their data with others directly in practice. In this paper, we present efficient protocols for privacy preserving collaborative outlier detection from arbitrarily partitioned data using Local Distance-based Outlier Factor (LDOF). Our protocols fall in the two-server model where data owners distribute their private data among two non-colluding servers who detect outlier on the joint data by secure two-party computation. In particular, we perform arithmetic operations which takes place inside LDOF on arithmetic circuits instead of boolean circuits, and perform sorting operations on boolean circuits. Such a design enables standard operations are performed with suitable circuits, and thus our scheme is more efficient. In addition, to further improve protocol efficiency, local sensitive hash (LSH) is utilized to filter out data which do not need secure computation to reduce the the amount of shared data. We implement our system in C++ on real data. The security analysis and experiments show the security and efficiency of the proposed scheme. Our protocols are more faster than the state of previous methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Atallah M, Du W (2001) Privacy-preserving cooperative statistical analysis. In: 17th annual computer security applications conference (ACSAC’01), pp 102–110 Atallah M, Du W (2001) Privacy-preserving cooperative statistical analysis. In: 17th annual computer security applications conference (ACSAC’01), pp 102–110
2.
Zurück zum Zitat Qin Z, Chen F, Wang Q, Liu AX (2012) Towards high performance security policy evaluation[J]. J Supercomput (Springer) 16(59):1577–1595CrossRef Qin Z, Chen F, Wang Q, Liu AX (2012) Towards high performance security policy evaluation[J]. J Supercomput (Springer) 16(59):1577–1595CrossRef
3.
Zurück zum Zitat Xu G, Li H, Ren H, Yang K, Deng RH (2019) Data security issues in deep learning: Attacks, countermeasures and opportunities. IEEE Commun Mag 57(11):116–122CrossRef Xu G, Li H, Ren H, Yang K, Deng RH (2019) Data security issues in deep learning: Attacks, countermeasures and opportunities. IEEE Commun Mag 57(11):116–122CrossRef
4.
Zurück zum Zitat Hao M, Li H, Luo X, Xu G, Yang H, Liu S (2019) Efficient and privacy-enhanced federated learning for industrial artificial intelligence, IEEE Transactions on Industrial Informatics Hao M, Li H, Luo X, Xu G, Yang H, Liu S (2019) Efficient and privacy-enhanced federated learning for industrial artificial intelligence, IEEE Transactions on Industrial Informatics
5.
Zurück zum Zitat Xu G, Li H, Liu S, Yang K, Lin X (2020) VerifyNet: Secure and verifiable federated learning. IEEE Trans Inf Foren Secur 15(1):911–926CrossRef Xu G, Li H, Liu S, Yang K, Lin X (2020) VerifyNet: Secure and verifiable federated learning. IEEE Trans Inf Foren Secur 15(1):911–926CrossRef
6.
Zurück zum Zitat Xu G, Li H, Dai Y, Yang K, Lin X (2019) Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Trans Inf Foren Secur 14(4):870–885CrossRef Xu G, Li H, Dai Y, Yang K, Lin X (2019) Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Trans Inf Foren Secur 14(4):870–885CrossRef
7.
Zurück zum Zitat Ren H, Li H, Dai Y, Yang K, Lin X (2018) Querying in internet of things with privacy preserving: Challenges, solutions and opportunities. IEEE Netw 32 (6):144 ⋅⋅C 151 Ren H, Li H, Dai Y, Yang K, Lin X (2018) Querying in internet of things with privacy preserving: Challenges, solutions and opportunities. IEEE Netw 32 (6):144 ⋅⋅C 151
8.
Zurück zum Zitat Li H, Yang Y, Dai Y, Yu S, Xiang Y (2017) Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data, IEEE Transactions on Cloud Computing Li H, Yang Y, Dai Y, Yu S, Xiang Y (2017) Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data, IEEE Transactions on Cloud Computing
9.
Zurück zum Zitat Xu G, Li H, Liu S, Wen M, Lu R (2019) Efficient and privacy-preserving truth discovery in mobile crowd sensing systems. IEEE Trans Veh Technol 68(4):3854–3865CrossRef Xu G, Li H, Liu S, Wen M, Lu R (2019) Efficient and privacy-preserving truth discovery in mobile crowd sensing systems. IEEE Trans Veh Technol 68(4):3854–3865CrossRef
10.
Zurück zum Zitat Li H, Liu D, Dai Y, Luan TH, Yu S (2018) Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Trans Emerg Topics Comput 6(1):97–109CrossRef Li H, Liu D, Dai Y, Luan TH, Yu S (2018) Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Trans Emerg Topics Comput 6(1):97–109CrossRef
11.
Zurück zum Zitat Jiang W, Li H, Xu G, Mi W, Dong G, Lin X (2019) PTAS: Privacy-preserving thin-client authentication scheme in blockchain-based PKI. Future Gener Comput Syst 96:185–195CrossRef Jiang W, Li H, Xu G, Mi W, Dong G, Lin X (2019) PTAS: Privacy-preserving thin-client authentication scheme in blockchain-based PKI. Future Gener Comput Syst 96:185–195CrossRef
12.
Zurück zum Zitat Vaidya J, Clifton C (2004) Privacy-preserving outlier detection. In: 4th IEEE international conference on data mining, pp 233–240 Vaidya J, Clifton C (2004) Privacy-preserving outlier detection. In: 4th IEEE international conference on data mining, pp 233–240
13.
Zurück zum Zitat Shaneck YKM, Kumar V (2009) Privacy preserving nearest neighbor search. In: 6th IEEE Int. Conf Data Mining Workshop, pp 247–276 Shaneck YKM, Kumar V (2009) Privacy preserving nearest neighbor search. In: 6th IEEE Int. Conf Data Mining Workshop, pp 247–276
14.
Zurück zum Zitat Ng RT, Breunig MM, Kriegel H-P, Sander J (2000) Lof: Identifying density-based local outliers. 93-104 ACM SIGMOD Rec Ng RT, Breunig MM, Kriegel H-P, Sander J (2000) Lof: Identifying density-based local outliers. 93-104 ACM SIGMOD Rec
15.
Zurück zum Zitat Vaidya J, Asif H, Talukdar T (2018) Differentially private outlier detection in a collaborative environment, International Journal of Cooperative Information Systems, 27(03) Vaidya J, Asif H, Talukdar T (2018) Differentially private outlier detection in a collaborative environment, International Journal of Cooperative Information Systems, 27(03)
16.
Zurück zum Zitat Jin H, Zhang K, Hutter M (2009) A new local distance-based outlier detection approach for scattered real-world data, Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, Berlin Jin H, Zhang K, Hutter M (2009) A new local distance-based outlier detection approach for scattered real-world data, Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, Berlin
17.
Zurück zum Zitat Ioannidis S, Weinsberg U, Joye M, Taft N, Nikolaenko V, Boneh D (2013) Privacy-preserving matrix factorization. In: ACM SIGSAC conference on computer communications security, pp 801–812 Ioannidis S, Weinsberg U, Joye M, Taft N, Nikolaenko V, Boneh D (2013) Privacy-preserving matrix factorization. In: ACM SIGSAC conference on computer communications security, pp 801–812
18.
Zurück zum Zitat Weinsberg U, Ioannidis S, Joye M, Boneh D, Nikolaenko V, Taft N (2013) Privacy-preserving ridge regression on hundreds of millions of records. IEEE symposium on security & privacy. IEEE Computer Society, pp 334–348 Weinsberg U, Ioannidis S, Joye M, Boneh D, Nikolaenko V, Taft N (2013) Privacy-preserving ridge regression on hundreds of millions of records. IEEE symposium on security & privacy. IEEE Computer Society, pp 334–348
19.
Zurück zum Zitat LINDELL Y., PINKAS B (2009) A proof of security of yao’s protocol for two-party computation, 161-188 Journal of Cryptology LINDELL Y., PINKAS B (2009) A proof of security of yao’s protocol for two-party computation, 161-188 Journal of Cryptology
20.
Zurück zum Zitat Asharov LY, Schneider G (2013) More efficient oblivious transfer and extensions for faster secure computation. In: ACM SIGSAC conference on Computer & communications security, pp 535–548 Asharov LY, Schneider G (2013) More efficient oblivious transfer and extensions for faster secure computation. In: ACM SIGSAC conference on Computer & communications security, pp 535–548
21.
Zurück zum Zitat Kilian J, Nissim K, Ishai Y, Petrank E (2003) Extending oblivious transfers efficiently. In: 23rd annual international cryptology conference. CiteSeer, pp 145–161 Kilian J, Nissim K, Ishai Y, Petrank E (2003) Extending oblivious transfers efficiently. In: 23rd annual international cryptology conference. CiteSeer, pp 145–161
22.
Zurück zum Zitat Asharov T, Schneider G, Lindell Y, Zohner M (2013) More efficient oblivious transfer and extensions for faster secure computation. In: ACM CCS’13, pp 535–548 Asharov T, Schneider G, Lindell Y, Zohner M (2013) More efficient oblivious transfer and extensions for faster secure computation. In: ACM CCS’13, pp 535–548
23.
Zurück zum Zitat Nielsen C, Orlandi JB, Nordholt PS, Burra SS (2012) A new approach to practical active-secure two-party computation. In: Cryptology conference on advances in Cryptology-crypto, pp 681–700 Nielsen C, Orlandi JB, Nordholt PS, Burra SS (2012) A new approach to practical active-secure two-party computation. In: Cryptology conference on advances in Cryptology-crypto, pp 681–700
24.
Zurück zum Zitat Schneider T, Demmler D, Zohner M (2015) Aby-a framework for efficient mixed-protocol secure two-party computation, Network and Distributed System Security Symposium Schneider T, Demmler D, Zohner M (2015) Aby-a framework for efficient mixed-protocol secure two-party computation, Network and Distributed System Security Symposium
25.
Zurück zum Zitat Beaver D. (1991) Efficient multiparty protocols using circuit randomization. In: CRYPTO 91, ser. LNCS, vol 576, pp 420–432. Springer Beaver D. (1991) Efficient multiparty protocols using circuit randomization. In: CRYPTO 91, ser. LNCS, vol 576, pp 420–432. Springer
26.
Zurück zum Zitat Nisan N, Pinkas B, Sella Y (2004) Fairplay-a secure two-party computation system. In: 13th conference on USENIX security symposium, vol 13, pp 20–20 Nisan N, Pinkas B, Sella Y (2004) Fairplay-a secure two-party computation system. In: 13th conference on USENIX security symposium, vol 13, pp 20–20
27.
Zurück zum Zitat Mohassel P, Kamara S (2011) Outsourcing multiparty computation, IACR Cryptology ePrint Archive Mohassel P, Kamara S (2011) Outsourcing multiparty computation, IACR Cryptology ePrint Archive
28.
Zurück zum Zitat CANETTI R (2001) Universally composable security: A new paradigm for cryptographic protocols. In: 42nd IEEE symposium on foundations of computer science, pp 136–145 CANETTI R (2001) Universally composable security: A new paradigm for cryptographic protocols. In: 42nd IEEE symposium on foundations of computer science, pp 136–145
29.
Zurück zum Zitat Zhang Y, Mohassel P (2017) Secureml: A system for scalable privacy-preserving machine learning. In: IEEE Symposium on Security and Privacy (SP) - San Jose, CA, USA, pp 19–38 Zhang Y, Mohassel P (2017) Secureml: A system for scalable privacy-preserving machine learning. In: IEEE Symposium on Security and Privacy (SP) - San Jose, CA, USA, pp 19–38
30.
Zurück zum Zitat Indyk P, Datar M, Immorlica N (2004) Localitysensitive hashing scheme based on p-stable distributions. In: 12th ann. symp. comput geometry, pp 253–262 Indyk P, Datar M, Immorlica N (2004) Localitysensitive hashing scheme based on p-stable distributions. In: 12th ann. symp. comput geometry, pp 253–262
31.
Zurück zum Zitat Yin H, Qin Z, Ou L et al (2017) A query privacy-enhanced and secure search scheme over encrypted data in cloud computing[J]. J Comput Syst Sci 90:14–27MathSciNetCrossRef Yin H, Qin Z, Ou L et al (2017) A query privacy-enhanced and secure search scheme over encrypted data in cloud computing[J]. J Comput Syst Sci 90:14–27MathSciNetCrossRef
32.
Zurück zum Zitat Ou L, Yin H, Qin Z, Xiao S, Yang G, Hu Y (2018) An efficient and privacy-preserving multi-user cloud-based LBS query scheme, Security and Communication Networks Ou L, Yin H, Qin Z, Xiao S, Yang G, Hu Y (2018) An efficient and privacy-preserving multi-user cloud-based LBS query scheme, Security and Communication Networks
33.
Zurück zum Zitat Lu C-S, Hsu C-Y (2009) Secure and robust sift. In: ACM 17th Int. Conf. Multimedia, pp 637–640 Lu C-S, Hsu C-Y (2009) Secure and robust sift. In: ACM 17th Int. Conf. Multimedia, pp 637–640
34.
Zurück zum Zitat Andoni A, Indyk P (2006) Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. In: IEEE 47th Ann. Symp. Found. Comput Sci, pp 459–468 Andoni A, Indyk P (2006) Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions. In: IEEE 47th Ann. Symp. Found. Comput Sci, pp 459–468
37.
Zurück zum Zitat Yang W, Li L, Huang L (2013) Privacy-preserving lof outlier detection. Knowl Inf Syst 42 (3):579–597 Yang W, Li L, Huang L (2013) Privacy-preserving lof outlier detection. Knowl Inf Syst 42 (3):579–597
Metadaten
Titel
Efficient distributed privacy-preserving collaborative outlier detection
verfasst von
Zhaohui Wei
Qingqi Pei
Xuefeng Liu
Lichuan Ma
Publikationsdatum
05.10.2020
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 6/2020
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-020-00903-8

Weitere Artikel der Ausgabe 6/2020

Peer-to-Peer Networking and Applications 6/2020 Zur Ausgabe