Ontology highlight
ABSTRACT: Background
Security concerns have been raised since big data became a prominent tool in data analysis. For instance, many machine learning algorithms aim to generate prediction models using training data which contain sensitive information about individuals. Cryptography community is considering secure computation as a solution for privacy protection. In particular, practical requirements have triggered research on the efficiency of cryptographic primitives.Methods
This paper presents a method to train a logistic regression model without information leakage. We apply the homomorphic encryption scheme of Cheon et al. (ASIACRYPT 2017) for an efficient arithmetic over real numbers, and devise a new encoding method to reduce storage of encrypted database. In addition, we adapt Nesterov's accelerated gradient method to reduce the number of iterations as well as the computational cost while maintaining the quality of an output classifier.Results
Our method shows a state-of-the-art performance of homomorphic encryption system in a real-world application. The submission based on this work was selected as the best solution of Track 3 at iDASH privacy and security competition 2017. For example, it took about six minutes to obtain a logistic regression model given the dataset consisting of 1579 samples, each of which has 18 features with a binary outcome variable.Conclusions
We present a practical solution for outsourcing analysis tools such as logistic regression analysis while preserving the data confidentiality.
SUBMITTER: Kim A
PROVIDER: S-EPMC6180367 | biostudies-literature | 2018 Oct
REPOSITORIES: biostudies-literature
Kim Andrey A Song Yongsoo Y Kim Miran M Lee Keewoo K Cheon Jung Hee JH
BMC medical genomics 20181011 Suppl 4
<h4>Background</h4>Security concerns have been raised since big data became a prominent tool in data analysis. For instance, many machine learning algorithms aim to generate prediction models using training data which contain sensitive information about individuals. Cryptography community is considering secure computation as a solution for privacy protection. In particular, practical requirements have triggered research on the efficiency of cryptographic primitives.<h4>Methods</h4>This paper pre ...[more]