Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets

11/14/2019
by   Shangqi Lai, et al.
0

Outlier detection is widely used in practice to track the anomaly on incremental datasets such as network traffic and system logs. However, these datasets often involve sensitive information, and sharing the data to third parties for anomaly detection raises privacy concerns. In this paper, we present a privacy-preserving outlier detection protocol (PPOD) for incremental datasets. The protocol decomposes the outlier detection algorithm into several phases and recognises the necessary cryptographic operations in each phase. It realises several cryptographic modules via efficient and interchangeable protocols to support the above cryptographic operations and composes them in the overall protocol to enable outlier detection over encrypted datasets. To support efficient updates, it integrates the sliding window model to periodically evict the expired data in order to maintain a constant update time. We build a prototype of PPOD and systematically evaluates the cryptographic modules and the overall protocols under various parameter settings. Our results show that PPOD can handle encrypted incremental datasets with a moderate computation and communication cost.

READ FULL TEXT

page 1

page 10

research
04/09/2019

Privacy-Preserving Hierarchical Clustering: Formal Security and Efficient Approximation

Machine Learning (ML) is widely used for predictive tasks in a number of...
research
08/10/2021

Secure k-Anonymization over Encrypted Databases

Data protection algorithms are becoming increasingly important to suppor...
research
01/17/2023

Analysis and Improvements of the Sender Keys Protocol for Group Messaging

Messaging between two parties and in the group setting has enjoyed wides...
research
09/01/2020

POSEIDON: Privacy-Preserving Federated Neural Network Learning

In this paper, we address the problem of privacy-preserving training and...
research
10/19/2020

Privacy Preserving Set-Based Estimation Using Partially Homomorphic Encryption

Set-based estimation has gained a lot of attention due to its ability to...
research
01/07/2020

Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes

Network Function Virtualisation (NFV) advances the development of compos...
research
11/20/2019

Privacy-Preserving Payment Splitting

Widely used payment splitting apps allow members of a group to keep trac...

Please sign up or login with your details

Forgot password? Click here to reset