Optimizing Secure Decision Tree Inference Outsourcing

نویسندگان

چکیده

Outsourcing decision tree inference services to the cloud is highly beneficial, yet raises critical privacy concerns on proprietary of model provider and private input data client. In this paper, we design, implement, evaluate a new system that allows efficient outsourcing inference. Our significantly improves upon prior art in overall online end-to-end secure service latency at as well local-side performance provider. We first present scheme which securely shifts most processing cloud, resulting substantial reduction provider's complexities. further devise substantially optimizes for particularly communication round The synergy these techniques our achieve up $8 \times$ better side over realistic WAN environment, bring notation="LaTeX">$19 savings notation="LaTeX">$18 computation.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Uncertain Decision Tree Inductive Inference

Induction is the process of reasoning in which General rules are formulated based on limited observations of recurring phenomenal patterns. Decision tree learning is one of the most widely used and practical inductive methods, which represents the results in a tree scheme. Various decision tree algorithms have already been proposed, such as CLS, ID3, Assistant and C4.5. These algorithms suffer ...

متن کامل

Secure and Privacy Preserving Outsourcing of Tree Structured Data

With the increasing use of web services, many new challenges concerning data security are becoming critical. Data or applications can now be outsourced to powerful remote servers, which are able to provide services on behalf of the owners. Unfortunately, such hosts may not always be trustworthy. In [1, 2], we presented a one-server computationally private tree traversal technique, which allows ...

متن کامل

Knowledge inference for optimizing and enforcing secure computations

We present several techniques that aim to compute the belief or knowledge a party might have about the values of hidden variables involved in the computation. These techniques can be used for enforcing knowledge-based security policies and for optimizing secure multiparty computations.

متن کامل

Optimizing Tree Pattern Queries over Secure XML Databases

The rapid emergence of XML as a standard for data representation and exchange over the Web has sparked considerable interest in models and efficient mechanisms for controlled access, especially using queries, to information represented in XML (see, e.g., [3,5-7,ll-13,311). A naive approach to secure XML query evaluation is: (i) compute the query result without consideration of any security poli...

متن کامل

Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors

Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion detection systems is managing of the large amount of network traffic features. Removing un...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing

سال: 2023

ISSN: ['1941-0018', '1545-5971', '2160-9209']

DOI: https://doi.org/10.1109/tdsc.2022.3194048