Skip to main content

2018 | OriginalPaper | Buchkapitel

Privacy-Preserving Credit Scoring on Cloud

verfasst von : Jilin Wang, Yingzi Chen, Xiaoqing Feng

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Credit scoring needs comprehensive data to achieve accurate assessment. However, these data often lie in the different places such as banks and financial institutions, internet firms, and almost all the data contain privacy information. Meanwhile, the acquisition of big data and privacy protection influence the rapid development of big data for credit scoring. And the introduction of big data for credit scoring proposes a lot of requirements for computing and storage capabilities. Cloud servers can provide powerful computing and storage services, but it also accompanies with higher privacy requirements. In this paper, we designed an additively homomorphic based secure multiparty computation scheme to collect and calculate credit data shared by different parties and at the same time preserve privacy in the cloud computing. We introduced two scenarios for credit scoring in this paper: one is to collect statistic information of relevant variables (such as a user’s overdue information in all banks) based on the existing credit model. The other is to collect a large amount of data for training to get credit evaluation model, but the efficiency of this scenario will be significantly lower due to the need of lots of multiplication operations. Finally, we analyzed the security and performance of our scheme, and proved that our scheme is safe and does not reveal the privacy of data in the cloud server.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Zhao, Z., Xu, S., Kang, B.H., Kabir, M.M.J., Liu, Y., Wasinger, R.: Investigation and improvement of multi-layer perceptron neural networks for credit scoring. Expert. Syst. Appl. 42(7), 3508–3516 (2015)CrossRef Zhao, Z., Xu, S., Kang, B.H., Kabir, M.M.J., Liu, Y., Wasinger, R.: Investigation and improvement of multi-layer perceptron neural networks for credit scoring. Expert. Syst. Appl. 42(7), 3508–3516 (2015)CrossRef
3.
Zurück zum Zitat Abellán, J., Castellano, J.G.: A comparative study on base classifiers in ensemble methods for credit scoring. Expert. Syst. Appl. 73, 1–10 (2016)CrossRef Abellán, J., Castellano, J.G.: A comparative study on base classifiers in ensemble methods for credit scoring. Expert. Syst. Appl. 73, 1–10 (2016)CrossRef
4.
Zurück zum Zitat Yap, B.W., Seng, H.O., Husain, N.H.M.: Using data mining to improve assessment of credit worthiness via credit scoring models. Expert Syst. Appl. 38(10), 13274–13283 (2011)CrossRef Yap, B.W., Seng, H.O., Husain, N.H.M.: Using data mining to improve assessment of credit worthiness via credit scoring models. Expert Syst. Appl. 38(10), 13274–13283 (2011)CrossRef
5.
Zurück zum Zitat Singh, S.: State-of-the-art survey on security issues in cloud computing environment. In: IEEE International Conference on Futuristic Trends in Computational Analysis and Knowledge Management, IEEE (2015) Singh, S.: State-of-the-art survey on security issues in cloud computing environment. In: IEEE International Conference on Futuristic Trends in Computational Analysis and Knowledge Management, IEEE (2015)
6.
Zurück zum Zitat Bommala, H.: Security issues in service model of cloud computing environment. In: International Conference on Computational Science (2016) Bommala, H.: Security issues in service model of cloud computing environment. In: International Conference on Computational Science (2016)
7.
Zurück zum Zitat Yan, Z., Deng, R.H., Varadharajan, V.: Cryptography and data security in cloud computing. Inf. Sci. 387, 53–55 (2017)CrossRef Yan, Z., Deng, R.H., Varadharajan, V.: Cryptography and data security in cloud computing. Inf. Sci. 387, 53–55 (2017)CrossRef
8.
Zurück zum Zitat Ilavarasi, A.K., Sathiyabhama, B.: An evolutionary feature set decomposition based anonymization for classification workloads: privacy preserving data mining. Clust. Comput. 20(Suppl. 1), 1–11 (2017) Ilavarasi, A.K., Sathiyabhama, B.: An evolutionary feature set decomposition based anonymization for classification workloads: privacy preserving data mining. Clust. Comput. 20(Suppl. 1), 1–11 (2017)
9.
Zurück zum Zitat Li, X., Miao, M., Liu, H., et al.: An incentive mechanism for K -anonymity in LBS privacy protection based on credit mechanism. Soft. Comput. 21(14), 3907–3917 (2017)CrossRef Li, X., Miao, M., Liu, H., et al.: An incentive mechanism for K -anonymity in LBS privacy protection based on credit mechanism. Soft. Comput. 21(14), 3907–3917 (2017)CrossRef
10.
Zurück zum Zitat Stecking, R., Schebesch, K.B.: Classification of credit scoring data with privacy constraints. Intell. Data Anal. 19(s1), S3–S18 (2015)CrossRef Stecking, R., Schebesch, K.B.: Classification of credit scoring data with privacy constraints. Intell. Data Anal. 19(s1), S3–S18 (2015)CrossRef
11.
Zurück zum Zitat Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. In: Foundations of Computer Science, vol. 2011, pp. 97–106 (2011) Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. In: Foundations of Computer Science, vol. 2011, pp. 97–106 (2011)
12.
Zurück zum Zitat Mr, M.M.P., Dhote, C.A., Mr, D.H.S.: Homomorphic encryption for security of cloud data. Procedia Comput. Sci. 79, 175–181 (2016)CrossRef Mr, M.M.P., Dhote, C.A., Mr, D.H.S.: Homomorphic encryption for security of cloud data. Procedia Comput. Sci. 79, 175–181 (2016)CrossRef
13.
Zurück zum Zitat Kumar, V., Kumar, R., Pandey, S.K., Alam, M.: Fully homomorphic encryption scheme with probabilistic encryption based on euler’s theorem and application in cloud computing. In: Aggarwal, V.B., Bhatnagar, V., Mishra, D.K. (eds.) Big Data Analytics. AISC, vol. 654, pp. 605–611. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-6620-7_58CrossRef Kumar, V., Kumar, R., Pandey, S.K., Alam, M.: Fully homomorphic encryption scheme with probabilistic encryption based on euler’s theorem and application in cloud computing. In: Aggarwal, V.B., Bhatnagar, V., Mishra, D.K. (eds.) Big Data Analytics. AISC, vol. 654, pp. 605–611. Springer, Singapore (2018). https://​doi.​org/​10.​1007/​978-981-10-6620-7_​58CrossRef
15.
Zurück zum Zitat Yan, Z., Ding, W., Niemi, V., Vasilakos, A.V.: Two schemes of privacy-preserving trust evaluation. Futur. Gener. Comput. Syst. 62(C), 175–189 (2016)CrossRef Yan, Z., Ding, W., Niemi, V., Vasilakos, A.V.: Two schemes of privacy-preserving trust evaluation. Futur. Gener. Comput. Syst. 62(C), 175–189 (2016)CrossRef
16.
Zurück zum Zitat Liu, A., Wang, W., Li, Z., Liu, G., Li, Q., Zhou, X., et al.: A privacy-preserving framework for trust-oriented point-of-interest recommendation. IEEE Access 99, 1 (2017) Liu, A., Wang, W., Li, Z., Liu, G., Li, Q., Zhou, X., et al.: A privacy-preserving framework for trust-oriented point-of-interest recommendation. IEEE Access 99, 1 (2017)
17.
Zurück zum Zitat Li, P., Li, J., Huang, Z., Gao, C.Z., Chen, W.B., Chen, K.: Privacy-preserving outsourced classification in cloud computing. Clust. Comput. 1, 1–10 (2017) Li, P., Li, J., Huang, Z., Gao, C.Z., Chen, W.B., Chen, K.: Privacy-preserving outsourced classification in cloud computing. Clust. Comput. 1, 1–10 (2017)
18.
Zurück zum Zitat Bu, F., Ma, Y., Chen, Z., Xu, H.: Privacy preserving back-propagation based on BGV on cloud. In: IEEE, International Conference on High Performance Computing and Communications, 2015 IEEE, International Symposium on Cyberspace Safety and Security, and 2015 IEEE, International Conference on Embedded Software and Systems, pp. 1791–1795. IEEE Computer Society (2015) Bu, F., Ma, Y., Chen, Z., Xu, H.: Privacy preserving back-propagation based on BGV on cloud. In: IEEE, International Conference on High Performance Computing and Communications, 2015 IEEE, International Symposium on Cyberspace Safety and Security, and 2015 IEEE, International Conference on Embedded Software and Systems, pp. 1791–1795. IEEE Computer Society (2015)
19.
Zurück zum Zitat Li, P., Li, J., Huang, Z., Li, T., Gao, C.Z., Yiu, S.M., et al.: Multi-key privacy-preserving deep learning in cloud computing. Futur. Gener. Comput. Syst. 74(C), 76–85 (2017)CrossRef Li, P., Li, J., Huang, Z., Li, T., Gao, C.Z., Yiu, S.M., et al.: Multi-key privacy-preserving deep learning in cloud computing. Futur. Gener. Comput. Syst. 74(C), 76–85 (2017)CrossRef
20.
Zurück zum Zitat Bost, R., Popa, R.A., Tu, S., Goldwasser, S.: Machine learning classification over encrypted data. In: Network and Distributed System Security Symposium (2014) Bost, R., Popa, R.A., Tu, S., Goldwasser, S.: Machine learning classification over encrypted data. In: Network and Distributed System Security Symposium (2014)
22.
Zurück zum Zitat Catalano, D., Gennaro, R., Howgrave-Graham, N., Nguyen, P.Q.: Paillier’s cryptosystem revisited. In: ACM Conference on Computer and Communications Security, pp. 206–214 (2001) Catalano, D., Gennaro, R., Howgrave-Graham, N., Nguyen, P.Q.: Paillier’s cryptosystem revisited. In: ACM Conference on Computer and Communications Security, pp. 206–214 (2001)
23.
Zurück zum Zitat Jurik, M.J.: Extensions to the paillier cryptosystem with applications to cryptological protocols (2003) Jurik, M.J.: Extensions to the paillier cryptosystem with applications to cryptological protocols (2003)
Metadaten
Titel
Privacy-Preserving Credit Scoring on Cloud
verfasst von
Jilin Wang
Yingzi Chen
Xiaoqing Feng
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-00012-7_18