2019 IEEE International Conference on Big Data (Big Data) 2019
DOI: 10.1109/bigdata47090.2019.9006000
|View full text |Cite
|
Sign up to set email alerts
|

SecureGBM: Secure Multi-Party Gradient Boosting

Abstract: Federated machine learning systems have been widely used to facilitate the joint data analytics across the distributed datasets owned by the different parties that do not trust each others. In this paper, we proposed a novel Gradient Boosting Machines (GBM) framework SecureGBM built-up with a multi-party computation model based on semi-homomorphic encryption, where every involved party can jointly obtain a shared Gradient Boosting machines model while protecting their own data from the potential privacy leakag… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
39
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 40 publications
(40 citation statements)
references
References 26 publications
1
39
0
Order By: Relevance
“…In this case, each party communicates with all the others. Although initially considered for the setting of two parties by Lindell and Pinkas [111] and subsequent works [41,55,56,76,160,181], it was later extended to arbitrary number of parties [38,48,70,100,102,104,106,149,168,179,182]. In this setting, some parties might be assigned specific tasks.…”
Section: Computation and Communication Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…In this case, each party communicates with all the others. Although initially considered for the setting of two parties by Lindell and Pinkas [111] and subsequent works [41,55,56,76,160,181], it was later extended to arbitrary number of parties [38,48,70,100,102,104,106,149,168,179,182]. In this setting, some parties might be assigned specific tasks.…”
Section: Computation and Communication Modelmentioning
confidence: 99%
“…We identify five categories of PETs: (a) input randomization ( §6.1), (b) differential privacy-based solutions ( §6.2), (c) cryptographic approaches ( §6.3), (d) hardware-based solutions ( §6.4), and (e) hybrid solutions that combine the above ( §6.5). [41,55,56,76,96,160] FD (2 parties) [111,121,181] FD (2 parties) [80] Leader [32,37,153,166,186] Leader [72,104,156,187] Leader [190] Sequential [110,162] Aggregator [52,117,119,152,154,172] Aggregator…”
Section: Protection Mechanismmentioning
confidence: 99%
See 2 more Smart Citations
“…In order to protect data security, data accessibility is controlled by attributing different levels of permission to avoid unauthorized or malicious access to data on the cloud [25]. In addition, encryption techniques [26], [27] and distributed data storage plan based on data partitioning [28], [29], [30] can be exploited. Federated learning is proposed to train a model while ensuring data privacy [31], yet it is not applicable to the general data processing among different organizations on the cloud.…”
Section: Related Workmentioning
confidence: 99%