Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data privacy protection system based on secure two-party calculation linear regression algorithm

A secure two-party computing and linear regression technology, applied in the field of information security, can solve the problems of high communication complexity, huge homomorphic encryption, low efficiency, etc., to achieve the effect of privacy protection

Pending Publication Date: 2021-01-05
SHANGHAI OCEAN UNIV
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the current secure multi-party computing scheme applied to machine learning needs some other cryptographic techniques (such as oblivious transfer protocol, homomorphic encryption, etc.), its main challenge is how to build a secure and efficient computing protocol through multiple parties.
[0005] In 2011, Hall et al. first proposed a secure two-party computing linear regression protocol based on homomorphic encryption, but it relied too much on homomorphic encryption with huge computational overhead, and this scheme could not be applied to data with huge data entries. concentrated
[0006] In summary, the traditional data privacy-preserving linear regression algorithm is usually based on the oblivious transfer protocol. Due to the high communication complexity of the oblivious transfer protocol and the computational limitations of homomorphic encryption, the efficiency in the regression task is not high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data privacy protection system based on secure two-party calculation linear regression algorithm
  • Data privacy protection system based on secure two-party calculation linear regression algorithm
  • Data privacy protection system based on secure two-party calculation linear regression algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The embodiments of the present invention are described in detail below in conjunction with the accompanying drawings: this embodiment is implemented on the premise of the technical solution of the present invention, and detailed implementation methods and specific operating procedures are provided, but the protection scope of the present invention is not limited to the following the described embodiment.

[0051] Such as Figure 1-3 As shown, a data privacy protection system based on a secure two-party computing linear regression algorithm includes a data preprocessing module, a secret shared value product module, a model parameter training module, a prediction module, multiple data providers, the first cloud server, The second cloud server and the data requesting end, the data providing end is used to provide the training set of the linear regression model, each data providing end has different data, the data is aggregated to form the training set, and the homomorphic ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a linear regression algorithm based on secure two-party calculation. The method comprises the following steps: S1, adopting multiplication of a secret sharing value; S2, preprocessing the training data; S3, initializing parameters; S4, updating model parameters; S5, preprocessing the prediction data; S6, calculating a prediction sharing value; and S7, reconstructing a prediction result. According to the scheme, the privacy of data and model parameters is not leaked, and meanwhile, the required communication overhead is lower. According to the method, privatization is carried out on original training data and model parameters, and a linear regression algorithm for protecting data privacy is realized by virtue of convenience of cloud service under the condition that acloud server cannot obtain the original training data and intermediate parameters and cannot deduce the model parameters. On the basis, a regression prediction task can be safely executed, and when computing and storing resources of the cloud server are utilized, training and data prediction of a linear regression model can be efficiently and accurately carried out.

Description

technical field [0001] The invention relates to the private field of information security technology, in particular to a data privacy protection system based on a secure two-party calculation linear regression algorithm. Background technique [0002] Linear regression (Linear Regression) is a method of modeling the relationship between one or more independent variables and dependent variables with a linear model. Its core idea is to fit a series of influencing factors and results to outline the relationship between the dependent variable Correlation among independent variables. As a classic algorithm, it is widely used in the field of statistical analysis and machine learning. In order to describe the optimal linear regression model, it is often necessary to provide a large amount of raw data from different data providers and send them to the cloud server for centralized training. However, cloud servers are often untrustworthy or even malicious, so research on how to avoid ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62H04L9/00H04L9/08H04L29/06
CPCG06F21/6209H04L9/008H04L9/085H04L63/0428Y02D30/50
Inventor 魏立斐张蕾李梦思陈聪聪
Owner SHANGHAI OCEAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products