Private Two-Party Cluster Analysis Made Formal & Scalable

Private Two-Party Cluster Analysis Made Formal & Scalable

Private Hierarchical Clustering and Efficient Approximation Xianrui Meng Dimitrios Papadopoulos [email protected] [email protected] Amazon Web Services Hong Kong University of Science and Technology Alina Oprea Nikos Triandopoulos [email protected] [email protected] Northeastern University Stevens Institute of Technology ABSTRACT especially so in unsupervised learning, where model inference uses In collaborative learning, multiple parties contribute their datasets unlabelled observations (evading points of saturation, encountered to jointly deduce global machine learning models for numerous in supervised learning, where new training sets improve accuracy predictive tasks. Despite its efficacy, this learning paradigm fails to only marginally). Also, the more varied the collected data, the more encompass critical application domains that involve highly sensi- elaborate its analysis, as degradation due to noise reduces and do- tive data, such as healthcare and security analytics, where privacy main coverage increases. Indeed, for a given learning objective, say risks limit entities to individually train models using only their own classification or anomaly detection, combining more datasets of datasets. In this work, we target privacy-preserving collaborative hi- similar type but different origin enables discovery of more complex, erarchical clustering. We introduce a formal security definition that interesting, hidden structures and of richer association rules (corre- aims to achieve balance between utility and privacy and present a lation or causality) among attributes. So, ML models improve their two-party protocol that provably satisfies it. We then extend our predictive power when they are built over multiple datasets owned protocol with: (i) an optimized version for single-linkage cluster- and contributed by different entities, in what is termed collaborative ing, and (ii) scalable approximation variants. We implement all our learning—and widely considered as the golden standard [100]. schemes and experimentally evaluate their performance and accu- Privacy-preserving hierarchical clustering. Several learning racy on synthetic and real datasets, obtaining very encouraging tasks of interest, across a variety of application domains, such as results. For example, end-to-end execution of our secure approxi- healthcare or security analytics, demand deriving accurate ML mod- mate protocol for over 1M 10-dimensional data samples requires els over highly sensitive data—e.g., personal, proprietary, customer, 35sec of computation and achieves 97.09% accuracy. or other types of data that induce liability risks. By default, since collaborative learning inherently implies some form of data sharing, CCS CONCEPTS entities in possession of such confidential datasets are left with no • Security and privacy ! Cryptography; • Computing other option than simply running their own local models, severely methodologies ! Unsupervised learning. impacting the efficacy of the learning task at hand. Thus, privacy risks are the main impediment to collaboratively learning richer KEYWORDS models over large volumes of varied, individually contributed, data. The security and ML community has embraced the concept of secure computation; private hierarchical clustering; secure approx- Privacy-preserving Collaborative Learning (PCL), the premise being imation that effective analytics over sensitive data is feasible by building global models in ways that protect privacy. This is closely related to 1 INTRODUCTION (privacy-preserving) ML-as-a-Service [42, 52, 53, 104] that utilizes Big-data analytics is an ubiquitous practice with a noticeable im- cloud providers for ML tasks, without parties revealing their sensi- pact on our lives. Our digital interactions produce massive amounts tive raw data (e.g., using encrypted or sanitized data. Existing work of data that are analyzed in order to discover unknown patterns on PCL mostly focuses on supervised rather than unsupervised arXiv:1904.04475v3 [cs.CR] 27 Sep 2021 or correlations, which help us draw safer conclusions or make in- learning tasks (with a few exceptions such as :-means clustering). formed decisions. At the core of this lies Machine Learning (ML) for As unsupervised learning is a prevalent paradigm, the design of devising complex data models and predictive algorithms that pro- ML protocols that promote collaboration and privacy is vital. vide hidden insights or automated actions, while optimizing certain In this paper, we study the problem of privacy-preserving hierar- objectives. Example applications that successfully employ ML are chical clustering. This unsupervised learning method groups data market forecast, service personalization, speech/face recognition, points into similarity clusters, using some well-defined distance autonomous driving, health diagnostics and security analytics. metric. The “hierarchic” part is because each data point starts as Of course, data analysis is only as good as the analyzed data, but a separate “singleton” cluster and clusters are iteratively merged this goes beyond the need to properly inspect, cleanse or transform building increasingly larger clusters. This process forms a natural high-fidelity data prior to its modeling: In most learning domains, hierarchy of clusters that is part of the output, showing how the analyzing “big data” is of twofold semantics: volume and variety. final clustering was produced. We present scalable cryptographic First, the larger the dataset available to an ML algorithm, the bet- protocols that allow two parties to privately learn a model for the ter its learning accuracy, as irregularities due to outliers fade away joint clusters of their combined datasets. Importantly, we propose a faster. Indeed, scalability to large dataset sizes is very important, formal security definition for this task in the MPC framework and prove our protocols satisfy it. In contrast, prior works for privacy- hierarchical clustering already includes the (now partitioned) in- preserving hierarchical clustering have proposed crypto-assisted put, this problem cannot directly benefit from MPC. This issue is protocols but without offering rigorous security definitions or anal- partially the reason why previous approaches for hierarchical clus- ysis (e.g., [27, 55, 57]; see detailed discussion in Section 8). tering (see discussion in Section 8 and an excellent survey of related Motivating applications. Hierarchical clustering is a class of un- work by Hegde et al. [49]) lack formal security analysis or have supervised learning methods that build a hierarchy of clusters over significant information leakage. To overcome this, our approach is an input dataset, typically in bottom-up fashion. Clusters are initial- to modify and refine what private hierarchical clustering should ized to each contain a single input point and are iteratively merged produce, redacting the joint output—sufficiently enough, to allow in pairs, according to a linkage metric that measures clusters’ close- the needed input privacy protection, but minimally so, to preserve ness based on their contained points. Here, unlike other clustering the learning utility. We introduce a security notion that is based on methods (:-means or spectral clustering), different distance metrics point-agnostic dendrograms, which explicitly capture only the merg- can define cluster linkage (e.g., nearest neighbor and diameter for ing history of formed joint clusters and useful statistics thereof, to single and complete linkage, respectively) and flexible conditions on balance the intended accuracy against the achieved privacy. To the these metrics can determine when merging ends. The final output best of our knowledge, our formal security definition (Section 3) is is a dendrogram with all formed clusters and their merging history. the first such attempt for the case of hierarchical clustering. This richer clustering type is widely used in practice, often in areas The next challenge is to securely realize this functionality ef- where the need for scalable PCL solutions is profound. ficiently. Standard tools for secure two-party computation, e.g., In healthcare, for instance, hierarchical clustering allows re- garbled circuits [113, 114], result in large communication, while searchers, clinicians and policy makers to process medical data fully homomorphic encryption [41] is still rather impractical, so and discover useful correlations to improve health practices—e.g., designing scalable hierarchical clustering PCL protocols is chal- discover similar genes types [34], patient profiles most in need of lenging. Moreover, hierarchical clustering of = points is already 3 targeted intervention [80, 110] or changes in healthcare costs for computation-heavy—of O¹= º cost. As such, approximation algo- specific treatments [68]. To be of any predictive value, such data rithms, e.g., CURE [47], are the de facto means to scale to massive contains sensitive information (e.g., patient records, gene informa- datasets, but incorporating approximation to private computation tion, or PII) that must be protected, also due to legislations such as is not trivial—as complications often arise in defining security [37]. HIPPA in US or GDPR in EU. Also, in security analytics, hierarchi- In Section 4, we follow a modular design approach and use cryp- cal clustering allows enterprise security personnel to process log tography judiciously by devising our main construction as a mixed data on network/users activity to discover suspicious

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    18 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us