Privacy-Preserving Coupling of Vertically-Partitioned Databases and Subsequent Training with Gradient Descent

  • Thijs Veugen*
  • , Bart Kamphorst
  • , Natasja van de L’Isle
  • , Marie Beth van Egmond
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Abstract

We show how multiple data-owning parties can collaboratively train several machine learning algorithms without jeopardizing the privacy of their sensitive data. In particular, we assume that every party knows specific features of an overlapping set of people. Using a secure implementation of an advanced hidden set intersection protocol and a privacy-preserving Gradient Descent algorithm, we are able to train a Ridge, LASSO or SVM model over the intersection of people in their data sets. Both the hidden set intersection protocol and privacy-preserving LASSO implementation are unprecedented in literature.

Original languageEnglish
Title of host publicationCyber Security Cryptography and Machine Learning
Subtitle of host publication5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8–9, 2021, Proceedings
EditorsShlomi Dolev, Oded Margalit, Benny Pinkas, Alexander Schwarzmann
Place of PublicationCham
PublisherSpringer
Pages38-51
Number of pages14
ISBN (Electronic)978-3-030-78086-9
ISBN (Print)978-3-030-78085-2
DOIs
Publication statusPublished - 2021
Externally publishedYes
Event5th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2021 - Be'er Sheva, Israel
Duration: 8 Jul 20219 Jul 2021
Conference number: 5

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume12716
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference5th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2021
Abbreviated titleCSCML 2021
Country/TerritoryIsrael
CityBe'er Sheva
Period8/07/219/07/21

Keywords

  • Gradient descent
  • Privacy-preserving LASSO regression
  • Secure multi-party computation
  • Secure set intersection
  • n/a OA procedure

Fingerprint

Dive into the research topics of 'Privacy-Preserving Coupling of Vertically-Partitioned Databases and Subsequent Training with Gradient Descent'. Together they form a unique fingerprint.

Cite this