Optimizing Secure Decision Tree Inference Outsourcing
نویسندگان
چکیده
Outsourcing decision tree inference services to the cloud is highly beneficial, yet raises critical privacy concerns on proprietary of model provider and private input data client. In this paper, we design, implement, evaluate a new system that allows efficient outsourcing inference. Our significantly improves upon prior art in overall online end-to-end secure service latency at as well local-side performance provider. We first present scheme which securely shifts most processing cloud, resulting substantial reduction provider's complexities. further devise substantially optimizes for particularly communication round The synergy these techniques our achieve up $8 \times$ better side over realistic WAN environment, bring notation="LaTeX">$19 savings notation="LaTeX">$18 computation.
منابع مشابه
Uncertain Decision Tree Inductive Inference
Induction is the process of reasoning in which General rules are formulated based on limited observations of recurring phenomenal patterns. Decision tree learning is one of the most widely used and practical inductive methods, which represents the results in a tree scheme. Various decision tree algorithms have already been proposed, such as CLS, ID3, Assistant and C4.5. These algorithms suffer ...
متن کاملSecure and Privacy Preserving Outsourcing of Tree Structured Data
With the increasing use of web services, many new challenges concerning data security are becoming critical. Data or applications can now be outsourced to powerful remote servers, which are able to provide services on behalf of the owners. Unfortunately, such hosts may not always be trustworthy. In [1, 2], we presented a one-server computationally private tree traversal technique, which allows ...
متن کاملKnowledge inference for optimizing and enforcing secure computations
We present several techniques that aim to compute the belief or knowledge a party might have about the values of hidden variables involved in the computation. These techniques can be used for enforcing knowledge-based security policies and for optimizing secure multiparty computations.
متن کاملOptimizing Tree Pattern Queries over Secure XML Databases
The rapid emergence of XML as a standard for data representation and exchange over the Web has sparked considerable interest in models and efficient mechanisms for controlled access, especially using queries, to information represented in XML (see, e.g., [3,5-7,ll-13,311). A naive approach to secure XML query evaluation is: (i) compute the query result without consideration of any security poli...
متن کاملAnomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors
Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion detection systems is managing of the large amount of network traffic features. Removing un...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Dependable and Secure Computing
سال: 2023
ISSN: ['1941-0018', '1545-5971', '2160-9209']
DOI: https://doi.org/10.1109/tdsc.2022.3194048