Abstract
In the big data era, data scientists explore machine learning methods for observed data to predict or classify. For machine learining to be effective, it requires access to raw data which is often privacy sensitive. In addition, whatever data and fitting procedures are employed, a crucial step is to select the most appropriate model from the given dataset. Model selection is a key ingredient in data analysis for reliable and reproducible statistical inference or prediction. To address this issue, we develop new techniques to provide solutions for running model selection over encrypted data. Our approach provides the best approximation of the relationship between the dependent and independent variable through cross validation. After performing 4-fold cross validation, 4 different estimates of our model’s errors are calculated. And then we use bias and variance extracted from these errors to find the best model. We perform an experiment on a dataset extracted from Kaggle and show that our approach can homomorphically regress a given encrypted data without decrypting it.
Original language | English |
---|---|
Title of host publication | Information Security Applications - 20th International Conference, WISA 2019, Revised Selected Papers |
Editors | Ilsun You |
Publisher | Springer |
Pages | 155-166 |
Number of pages | 12 |
ISBN (Print) | 9783030393021 |
DOIs | |
Publication status | Published - 2020 |
Event | 20th World Conference on Information Security Applications, WISA 2019 - Jeju Island, Korea, Republic of Duration: 2019 Aug 21 → 2019 Aug 24 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 11897 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 20th World Conference on Information Security Applications, WISA 2019 |
---|---|
Country/Territory | Korea, Republic of |
City | Jeju Island |
Period | 19/8/21 → 19/8/24 |
Bibliographical note
Funding Information:This research is supported by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the IITP support program (2017-0-00545). We thank Joonsoo Yoo and Jeonghwan Hwang for their assistance in this research.
Publisher Copyright:
© 2020, Springer Nature Switzerland AG.
Keywords
- Fully Homomorphic Encryption
- Model selection
- TFHE
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science