Skip to main content

2019 | OriginalPaper | Buchkapitel

Efficient Privacy Preserving Cross-Datasets Collaborative Outlier Detection

verfasst von : Zhaohui Wei, Qingqi Pei, Xuefeng Liu, Lichuan Ma

Erschienen in: Cyberspace Safety and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Outlier detection is one of the most important data analytics tasks and is used in numerous applications and domains. It is the identification of rare items, events or observations which raise suspicions by differing significantly from the majority of the data. The accuracy of the outlier detection depends on sufficient data. However, the underlying data is distributed across different organizations. If outlier detection is done locally, the results obtained are not as accurate as when outlier detection is done collaboratively over the combined data. Unfortunately, competitive advantage, privacy concerns and regulations, and issues surrounding data sovereignty and jurisdiction prevent many organizations from openly sharing their data. In this paper, we address precisely this issue. We present new and efficient protocols for privacy preserving outlier detection to find outliers from arbitrarily partitioned categorical data. Our protocols fall in the two-server model where data owners distribute their private data among two non-colluding servers who detects on the joint data using secure two-party computation (2PC). Our method is based on Local Distance-based Outlier Factor (LDOF) using the relative location of an object to its neighbours to determine the degree to which the object deviates from its neighbourhood. We provide the privacy guarantee by using secure multiparty computation techniques. We implement our system in C++ on real data. Our experiments validate that our protocols are both effective and efficient.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Vaidya, J., Clifton, C., Kantarcioglu, M.: Tools for privacy preserving distributed data mining. ACM SIGKDD Explor. Newsl. 4, 28–34 (2002)CrossRef Vaidya, J., Clifton, C., Kantarcioglu, M.: Tools for privacy preserving distributed data mining. ACM SIGKDD Explor. Newsl. 4, 28–34 (2002)CrossRef
2.
Zurück zum Zitat Clifton, C., Kantarcioglu, M.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowl. Data Eng. 16, 1026–1037 (2004)CrossRef Clifton, C., Kantarcioglu, M.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowl. Data Eng. 16, 1026–1037 (2004)CrossRef
3.
Zurück zum Zitat Clifton, C., Vaidya, J.: Privacy preserving association rule mining in vertically partitioned data. In: 8th ACMSIGKDD International Conference on Knowledge Discovery and Data Mining (KDD02), pp. 639–644 (2002) Clifton, C., Vaidya, J.: Privacy preserving association rule mining in vertically partitioned data. In: 8th ACMSIGKDD International Conference on Knowledge Discovery and Data Mining (KDD02), pp. 639–644 (2002)
4.
Zurück zum Zitat Wright, R., Jagannathan, G.: Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In: 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining (KDD05), pp 593–599 (2005) Wright, R., Jagannathan, G.: Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In: 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining (KDD05), pp 593–599 (2005)
5.
Zurück zum Zitat Ghosh, J., Merugu, S.: Privacy-preserving distributed clustering using generative models. In: 3rd IEEE International Conference on Data Mining (ICDM03), pp. 211–218 (2003) Ghosh, J., Merugu, S.: Privacy-preserving distributed clustering using generative models. In: 3rd IEEE International Conference on Data Mining (ICDM03), pp. 211–218 (2003)
6.
Zurück zum Zitat Clifton, C., Vaidya, J.: Privacy-preserving k-means clustering over vertically partitioned data. In: 9th ACMSIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2003), pp 206–215 (2003) Clifton, C., Vaidya, J.: Privacy-preserving k-means clustering over vertically partitioned data. In: 9th ACMSIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2003), pp 206–215 (2003)
7.
Zurück zum Zitat Srikant, R., Agrawal, R.: Privacy-preserving data mining. In: ACMSIGMOD International Conference on Management of Data (SIGMOD 2000), pp. 439–450 (2000) Srikant, R., Agrawal, R.: Privacy-preserving data mining. In: ACMSIGMOD International Conference on Management of Data (SIGMOD 2000), pp. 439–450 (2000)
8.
Zurück zum Zitat Pinkas, B., Lindell, Y.: Privacy preserving data mining. In: 20th Annual International Cryptology Conference (CRYPTO 2000), pp. 36–54 (2000) Pinkas, B., Lindell, Y.: Privacy preserving data mining. In: 20th Annual International Cryptology Conference (CRYPTO 2000), pp. 36–54 (2000)
9.
Zurück zum Zitat Clifton, C., Vaidya, J.: Privacy preserving naive Bayes classifier for vertically partitioned data. In: SIAM International Conference on Data Mining (SDM 2004), pp. 522–526 (2004) Clifton, C., Vaidya, J.: Privacy preserving naive Bayes classifier for vertically partitioned data. In: SIAM International Conference on Data Mining (SDM 2004), pp. 522–526 (2004)
10.
Zurück zum Zitat Wang, S., Zhao, W., Zhang, N.: A new scheme on privacy-preserving data classification. In: 11th ACM-SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2005), pp. 374–383 (2005) Wang, S., Zhao, W., Zhang, N.: A new scheme on privacy-preserving data classification. In: 11th ACM-SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2005), pp. 374–383 (2005)
12.
Zurück zum Zitat Rastogi, R., Shim, K., Ramaswame, S.: Efficient algorithms formining outliers from large data sets. In: ACMSIGMOD International Conference on Management of Data (SIGMOD 2000), pp. 427–438 (2000) Rastogi, R., Shim, K., Ramaswame, S.: Efficient algorithms formining outliers from large data sets. In: ACMSIGMOD International Conference on Management of Data (SIGMOD 2000), pp. 427–438 (2000)
13.
Zurück zum Zitat Atallah, M., Du, W.: Privacy-preserving cooperative statistical analysis. In: 17th Annual Computer Security Applications Conference (ACSAC 2001), pp. 102–110 (2001) Atallah, M., Du, W.: Privacy-preserving cooperative statistical analysis. In: 17th Annual Computer Security Applications Conference (ACSAC 2001), pp. 102–110 (2001)
14.
Zurück zum Zitat Syverson, P., Goldschlag, D., Reed, M.: Onion routing. Commun. ACM 42, 39–41 (1999) Syverson, P., Goldschlag, D., Reed, M.: Onion routing. Commun. ACM 42, 39–41 (1999)
15.
Zurück zum Zitat Vaidya, J., Clifton, C.: Privacy-preserving outlier detection. In: 4th IEEE International Conference on Data Mining, pp. 233–240 (2004) Vaidya, J., Clifton, C.: Privacy-preserving outlier detection. In: 4th IEEE International Conference on Data Mining, pp. 233–240 (2004)
16.
Zurück zum Zitat Asif, H., Talukdar, T., Vaidya, J.: Differentially private outlier detection in a collaborative environment. Int. J. Coop. Inf. Syst. 27(03), 1850005 (2018)CrossRef Asif, H., Talukdar, T., Vaidya, J.: Differentially private outlier detection in a collaborative environment. Int. J. Coop. Inf. Syst. 27(03), 1850005 (2018)CrossRef
17.
Zurück zum Zitat Nikolaenko, V., Ioannidis, S., Weinsberg, U., Joye, M., Taft, N., Boneh, D.: Privacy-preserving matrix factorization. In: ACM SIGSAC Conference on Computer Communications Security, pp. 801–812 (2013) Nikolaenko, V., Ioannidis, S., Weinsberg, U., Joye, M., Taft, N., Boneh, D.: Privacy-preserving matrix factorization. In: ACM SIGSAC Conference on Computer Communications Security, pp. 801–812 (2013)
18.
Zurück zum Zitat Nikolaenko, V., Weinsberg, U., Ioannidis, S., Joye, M., Boneh, D., Taft, N.: Privacy-preserving ridge regression on hundreds of millions of records. In: IEEE Symposium on Security and Privacy, pp. 334–348 (2013) Nikolaenko, V., Weinsberg, U., Ioannidis, S., Joye, M., Boneh, D., Taft, N.: Privacy-preserving ridge regression on hundreds of millions of records. In: IEEE Symposium on Security and Privacy, pp. 334–348 (2013)
20.
Zurück zum Zitat Lindell, Y., Pinkas, B.: A proof of security of Yaos protocol for two-party computation. J. Cryptology 22, 161–188 (2009)MathSciNetCrossRef Lindell, Y., Pinkas, B.: A proof of security of Yaos protocol for two-party computation. J. Cryptology 22, 161–188 (2009)MathSciNetCrossRef
22.
Zurück zum Zitat Schneider, T., Asharov, G., Lindell, Y., Zohner, M.: More efficient oblivious transfer and extensions for faster secure computation. In: ACM CCS 2013, pp. 535–548 (2013) Schneider, T., Asharov, G., Lindell, Y., Zohner, M.: More efficient oblivious transfer and extensions for faster secure computation. In: ACM CCS 2013, pp. 535–548 (2013)
24.
Zurück zum Zitat Demmler, D., Schneider, T., Zohner, M.: ABY-a framework for efficient mixed-protocol secure two-party computation. In: NDSS (2015) Demmler, D., Schneider, T., Zohner, M.: ABY-a framework for efficient mixed-protocol secure two-party computation. In: NDSS (2015)
25.
Zurück zum Zitat Nisan, N., Pinkas, B., Sella, Y., Malkhi, D., et al. : Fairplay a secure two-party computation system. In: 13th Conference on USENIX Security Symposium, vol. 13, pp. 20–20 (2004) Nisan, N., Pinkas, B., Sella, Y., Malkhi, D., et al. : Fairplay a secure two-party computation system. In: 13th Conference on USENIX Security Symposium, vol. 13, pp. 20–20 (2004)
27.
Zurück zum Zitat Kamara, S., Mohassel, P., Raykova, M.: Outsourcing multiparty computation. IACR Cryptology ePrint Archive 272 (2011) Kamara, S., Mohassel, P., Raykova, M.: Outsourcing multiparty computation. IACR Cryptology ePrint Archive 272 (2011)
28.
Zurück zum Zitat Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: 42nd IEEE Symposium on Foundations of Computer Science (FOCS 2001), pp. 136–145 (2001) Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: 42nd IEEE Symposium on Foundations of Computer Science (FOCS 2001), pp. 136–145 (2001)
29.
Zurück zum Zitat Zhang, Y., Mohassel, P.: SecureML: a system for scalable privacy-preserving machine learning. In: IEEE Symposium on Security and Privacy (SP), pp. 19–38 (2017) Zhang, Y., Mohassel, P.: SecureML: a system for scalable privacy-preserving machine learning. In: IEEE Symposium on Security and Privacy (SP), pp. 19–38 (2017)
Metadaten
Titel
Efficient Privacy Preserving Cross-Datasets Collaborative Outlier Detection
verfasst von
Zhaohui Wei
Qingqi Pei
Xuefeng Liu
Lichuan Ma
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-37352-8_31