File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

김미란

Kim, Miran
Applied Cryptography Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.endPage 710 -
dc.citation.startPage 695 -
dc.citation.title IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY -
dc.citation.volume 15 -
dc.contributor.author Kim, Miran -
dc.contributor.author Lee, Junghye -
dc.contributor.author Ohno-Machado, Lucila -
dc.contributor.author Jiang, Xiaoqian -
dc.date.accessioned 2023-12-21T18:12:13Z -
dc.date.available 2023-12-21T18:12:13Z -
dc.date.created 2019-07-08 -
dc.date.issued 2020-01 -
dc.description.abstract Scientific collaborations benefit from sharing information and data from distributed sources, but protecting privacy is a major concern. Researchers, funders, and the public in general are getting increasingly worried about the potential leakage of private data. Advanced security methods have been developed to protect the storage and computation of sensitive data in a distributed setting. However, they do not protect against information leakage from the outcomes of data analyses. To address this aspect, studies on differential privacy (a state-ofthe-art privacy protection framework) demonstrated encouraging results, but most of them do not apply to distributed scenarios. Combining security and privacy methodologies is a natural way to tackle the problem, but naive solutions may lead to poor analytical performance. In this article, we introduce a novel strategy that combines differential privacy methods and homomorphic encryption techniques to achieve the best of both worlds. Using logistic regression (a popular model in biomedicine), we demonstrated the practicability of building secure and privacypreserving models with high efficiency (less than 3 minutes) and good accuracy (< 1 % of difference in the area under the receiver operating characteristic curve (AUC) against the global model) using a few real-world datasets. -
dc.identifier.bibliographicCitation IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.15, pp.695 - 710 -
dc.identifier.doi 10.1109/tifs.2019.2925496 -
dc.identifier.issn 1556-6013 -
dc.identifier.scopusid 2-s2.0-85072754114 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/26857 -
dc.identifier.url https://ieeexplore.ieee.org/document/8747377 -
dc.identifier.wosid 000493566500013 -
dc.language 영어 -
dc.publisher Institute of Electrical and Electronics Engineers -
dc.title Secure and Differentially Private Logistic Regression for Horizontally Distributed Data -
dc.type Article -
dc.description.isOpenAccess FALSE -
dc.relation.journalWebOfScienceCategory Computer Science, Theory & Methods; Engineering, Electrical & Electronic -
dc.relation.journalResearchArea Computer Science; Engineering -
dc.type.docType Article -
dc.description.journalRegisteredClass scie -
dc.description.journalRegisteredClass scopus -
dc.subject.keywordAuthor Logistic regression -
dc.subject.keywordAuthor differential privacy -
dc.subject.keywordAuthor homomorphic encryption -
dc.subject.keywordPlus MODELS -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.