Approximating Private Set Union/Intersection Cardinality with Logarithmic Complexity

Approximating Private Set Union/Intersection Cardinality with Logarithmic Complexity

1 Approximating Private Set Union/Intersection Cardinality with Logarithmic Complexity Changyu Dong, Grigorios Loukides Abstract—The computation of private set union/intersection cardinality (PSU-CA/PSI-CA) is one of the most intensively studied problems in Privacy Preserving Data Mining (PPDM). However, existing protocols are computationally too expensive to be employed in real-world PPDM applications. In response, we propose efficient approximate protocols, whose accuracy can be tuned according to application requirements. We first propose a two-party PSU-CA protocol based on Flajolet-Martin sketches. The protocol has logarithmic computational/communication complexity and relies mostly on symmetric key operations. Thus, it is much more efficient and scalable than existing protocols. In addition, our protocol can hide its output. This feature is necessary in PPDM applications, since the union cardinality is often an intermediate result that must not be disclosed. We then propose a two-party PSI-CA protocol, which is derived from the PSU-CA protocol with virtually no cost. Both our two-party protocols can be easily extended to the multiparty setting. 1 We also design an efficient masking scheme for (n)-OT . The scheme is used in optimizing the two-party protocols and is of 1 independent interest, since it can speed up (n)-OT significantly when n is large. Last, we show through experiments the effectiveness and efficiency of our protocols. F 1 INTRODUCTION is not possible, and PPDM methods are needed to perform data We are in an era where data becomes increasingly important. mining in a distributed fashion, without disclosing or pooling the On one hand, data drives scientific research, business analytics, data of any party. and government decision making. Advanced technologies for dis- This paper investigates a long-established problem in PPDM: covering interesting knowledge from large amounts of data have how to securely compute the cardinality of the union or the in- become an indispensable part of nearly everything. On the other tersection of some private sets (PSU-CA/PSI-CA). More formally, hand, data privacy becomes of paramount importance as evidenced consider two parties each holding a private set Si. The PSU-CA problem is to securely compute the union cardinality S S , and by the increasingly tighter legal obligation imposed by legislation j 1[ 2j (e.g. HIPAA, COPPA, and GLB in the US, European Union the PSI-CA problem is to securely compute the intersection cardi- nality S S . At the end, parties should obtain the cardinality Data Protection Directive, and more specific national privacy j 1 \ 2j regulations). Driven by both, recently we have seen a significant of the union/intersection but nothing else about other parties’ sets. advancement in privacy preserving data mining (PPDM). In many PSU-CA and PSI-CA can be defined similarly in the multiparty scenarios, mining the union of data held by two or more parties (> 2) case. PSU-CA and PSI-CA are closely related: often solving could deliver a clear benefit. For example, online retailers want one problem leads to an easy solution to the other problem. to find correlations between products bought by their common Thus they can be treated as one problem. The problem is of customers to boost sales, policy makers want to link healthcare practical importance because protocols for solving the problem are data held by public and private healthcare providers to develop important building blocks in PPDM. For example, PSU-CA/PSI- better public policies, and geneticists want to associate mutations CA protocols have been used as subroutines in privacy preserving in human genomes with diagnoses in medical records to identify association rule mining [1], privacy preserving classification (e.g. genetic causes of cancers. In all these scenarios, privacy concerns decision trees [2] and Support Vector Machine [3]), and privacy and/or privacy regulations prohibit the sharing of data between preserving mining of social network data [4]. parties. Thus, the application of conventional data mining methods The PSU-CA/PSI-CA problem can be solved by using generic secure computation protocols (e.g. garbled circuits [5], GMW • Changyu Dong is with the School of Computing Science, [6]). However those protocols have high computational and com- Newcastle University, Newcastle Upon Tyne, UK. Email: munication costs and are difficult to scale to large sets that are [email protected]. required in real-world data mining applications. Thus several • Grigorios Loukides is with the Department of Informatics, King’s College London, London, UK. Email: [email protected]. custom protocols have been proposed to solve the PSU-CA/PSI- • This paper has supplementary downloadable material available at CA problem. Many of them aim to compute the exact cardinality http://ieeexplore.ieee.org, provided by the authors. The material includes [7], [8], [9], [1], [10], [11], [12]. Yet, their high computational the appendices of this paper. Contact [email protected] for further questions about this work. cost makes their application to PPDM infeasible. For example, • Accepted to be published in IEEE Transactions on Information Forensics let us consider a scenario in which two social network providers and Security ( Volume: 12, Issue: 11, Nov. 2017 ) need to find out the total number of friends of each user that has • DOI: 10.1109/TIFS.2017.2721360 c 2017 IEEE. Personal use of this registered in both networks. For each such user, the two providers material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this can locally construct a set that contains all friends of the user in material for advertising or promotional purposes, creating new collective their own social network. Then the two providers can run a PSU- works, for resale or redistribution to servers or lists, or reuse of any CA protocol to find the union cardinality of the two sets, which copyrighted component of this work in other works. is equal to the total number of friends of the user. The input to 2 the protocol can be large because a user may have thousands of , the maximum possible cardinality of the private sets1. friends. Even with the most efficient protocol to date, finding the ThisN is achieved by using FM sketches. Second, our protocol union cardinality would need tens or even hundreds of seconds. is mainly based on symmetric key operations, while most Furthermore, there are millions of users registered in both social existing protocols (except generic protocols) are based on much networks. Thus, the protocol needs to run millions of times, and slower public key operations. The accuracy of the estimation the task may take months or even years. This is clearly impractical. of our protocol is adjustable with a public parameter m. In Recently, there has been much interest in approximate PSU-CA practice, larger m values improve the estimation accuracy. More and PSI-CA protocols [13], [14], [15]. It is well-known that in precisely, by setting m to a large enough value, the protocol data mining, a close approximation is often as good as the exact can guarantee the relative error ( Ne N )=N is at most with j − j result [16]. Approximation is widely used in data mining to handle probability at least 1 δ for any arbitrary , δ (0; 1), where − 2 extremely large datasets when the exact answer is hard to compute N is the true cardinality and N is the estimated cardinality. The [17]. With a bounded loss of accuracy, it is possible to make minimum allowable value for m depends on the parameters the whole data mining process much more efficient. The same δ and , as it will be explainede in Section 4.1. We evaluated principle applies to PPDM. That is, approximation can simplify the protocol based on our prototype implementation and found protocol design and reduce the size of input to the protocol which that, to compute the union cardinality of two sets with size both could help making the protocol more efficient. Unfortunately, up to 1 million, it only needed 2.97 seconds when = 1% the current approximate PSU-CA and PSI-CA protocols are either and δ = 0:001. In contrast, the state-of-the-art two-party insecure ([13], [14]) or not very efficient ([15]), as we discuss in approximate protocol [15] took 488.48 seconds to do the same Section 2. computation with the same accuracy. Eliminates unwanted information leakage. We design the pro- • A more subtle problem of most of existing protocols ([7], [8], tocol such that by default, no party learns the cardinality at the [1], [11], [14], [9], [10], [13], [15], [12]) is that they output the end of the protocol. The result is split into secret shares and each intersection/union cardinality directly to one or all parties. This is party holds one share. The shares leak no information about perfectly fine as per the definition of the problems. However, the the result. If the cardinality is the final result, the parties can cardinalities may not be the end result the parties want. Especially reconstruct it from the shares easily and reveal the cardinality. in PPDM, these protocols are often used as subroutines and the Or if the protocols are used as subroutines in a larger PPDM cardinalities are only intermediate results. Outputting cardinalities protocol, the shares can be fed into the next step of the increases the leakage of the PPDM protocol: ideally intermediate PPDM protocol without leaking the cardinality. We decided to results should be hidden and the only output should be the data output the result as secret shares for three reasons: (1) it is mining result. For instance, in the social network example above, simple and incurs virtually no cost to produce the shares; (2) the two providers want to find out the k most influential users.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    20 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us