Abstract
Many services for data analysis require customer’s data to be exposed and privacy issues are critical in related fields. To address this problem, we propose a Privacy-Preserving Naive Bayes classifier (PP-NBC) model which provides classification results without leaking privacy information in data sources. Through classification process in PP-NBC, the operations are evaluated using encrypted data by applying fully homomorphic encryption scheme so that service providers are able to handle customer’s data without knowing their actual values. The proposed method is implemented with a homomorphic encryption library called HElib and we carry out a primitive performance evaluation for the proposed PP-NBC.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Amazon Web Services (AWS). https://aws.amazon.com/
Data.gov. https://www.data.gov/
EU GDPR Information Portal. http://eugdpr.org/eugdpr.org-1.html
Konen, J., McMahan, H.B., Yu, F.X., Richtarik, P., Suresh, A.T., Bacon, D.: Federated learning: strategies for improving communication efficiency. In: NIPS Workshop on Private Multi-Party Machine Learning (2016)
Li, X., Zhu, Y., Wang, J.: Secure Naïve Bayesian classification over encrypted data in cloud. In: Chen, L., Han, J. (eds.) ProvSec 2016. LNCS, vol. 10005, pp. 130–150. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-47422-9_8
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48910-X_16
Gentry, C.: A Fully Homomorphic Encryption Scheme. Dissertation for Ph.D. degree, Stanford University, United States - California (2009)
Fisher, R.A.: The use of multiple measurements in taxonomic problems. Ann. Eugenics 7(2), 179–188 (1936)
UCI Machine Learning Repository. http://archive.ics.uci.edu/ml
Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. Commun. ACM 51, 107–113 (2008)
Yao, A.C.: How to generate and exchange secrets. In: 27th Annual Symposium on Foundations of Computer Science, pp. 162–167 (1986)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Kim, S., Omori, M., Hayashi, T., Omori, T., Wang, L., Ozawa, S. (2018). Privacy-Preserving Naive Bayes Classification Using Fully Homomorphic Encryption. In: Cheng, L., Leung, A., Ozawa, S. (eds) Neural Information Processing. ICONIP 2018. Lecture Notes in Computer Science(), vol 11304. Springer, Cham. https://doi.org/10.1007/978-3-030-04212-7_30
Download citation
DOI: https://doi.org/10.1007/978-3-030-04212-7_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-04211-0
Online ISBN: 978-3-030-04212-7
eBook Packages: Computer ScienceComputer Science (R0)