Consent-based Privacy-preserving Decision Tree Evaluation

Author(s):  
Liang Xue ◽  
Dongxiao Liu ◽  
Jianbing Ni ◽  
Xiaodong Lin ◽  
Xuemin Sherman Shen
Symmetry ◽  
2020 ◽  
Vol 12 (1) ◽  
pp. 103 ◽  
Author(s):  
Lin Liu ◽  
Jinshu Su ◽  
Baokang Zhao ◽  
Qiong Wang ◽  
Jinrong Chen ◽  
...  

With the fast development of the Internet of Things (IoT) technology, normal people and organizations can produce massive data every day. Due to a lack of data mining expertise and computation resources, most of them choose to use data mining services. Unfortunately, directly sending query data to the cloud may violate their privacy. In this work, we mainly consider designing a scheme that enables the cloud to provide an efficient privacy-preserving decision tree evaluation service for resource-constrained clients in the IoT. To design such a scheme, a new secure comparison protocol based on additive secret sharing technology is proposed in a two-cloud model. Then we introduce our privacy-preserving decision tree evaluation scheme which is designed by the secret sharing technology and additively homomorphic cryptosystem. In this scheme, the cloud learns nothing of the query data and classification results, and the client has no idea of the tree. Moreover, this scheme also supports offline users. Theoretical analyses and experimental results show that our scheme is very efficient. Compared with the state-of-art work, both the communication and computational overheads of the newly designed scheme are smaller when dealing with deep but sparse trees.


Author(s):  
ARON LARSSON ◽  
JIM JOHANSSON ◽  
LOVE EKENBERG ◽  
MATS DANIELSON

We present a decision tree evaluation method for analyzing multi-attribute decisions under risk, where information is numerically imprecise. The approach extends the use of additive and multiplicative utility functions for supporting evaluation of imprecise statements, relaxing requirements for precise estimates of decision parameters. Information is modeled in convex sets of utility and probability measures restricted by closed intervals. Evaluation is done relative to a set of rules, generalizing the concept of admissibility, computationally handled through optimization of aggregated utility functions. Pros and cons of two approaches, and tradeoffs in selecting a utility function, are discussed.


Cybersecurity ◽  
2019 ◽  
Vol 2 (1) ◽  
Author(s):  
Qingfeng Chen ◽  
Xu Zhang ◽  
Ruchang Zhang

2017 ◽  
Vol 22 (S1) ◽  
pp. 1581-1593 ◽  
Author(s):  
Ye Li ◽  
Zoe L. Jiang ◽  
Lin Yao ◽  
Xuan Wang ◽  
S. M. Yiu ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document