2018
DOI: 10.1155/2018/2385150
|View full text |Cite
|
Sign up to set email alerts
|

Securely Outsourcing ID3 Decision Tree in Cloud Computing

Abstract: With the wide application of Internet of Things (IoT), a huge number of data are collected from IoT networks and are required to be processed, such as data mining. Although it is popular to outsource storage and computation to cloud, it may invade privacy of participants’ information. Cryptography-based privacy-preserving data mining has been proposed to protect the privacy of participating parties’ data for this process. However, it is still an open problem to handle with multiparticipant’s ciphertext computa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 38 publications
(39 reference statements)
0
4
0
Order By: Relevance
“…They conducted research on the security and privacy issues faced after the data was outsourced to the cloud server and conducted research and experimental analysis on the SVM and gradient descent algorithm, respectively. Li et al [34] solved the out-sourcing security challenge under the malicious model and used homomorphic encryption and security obfuscation circuit technology to implement the secure outsourcing calculation of the ID3 decision tree algorithm. Under the semihonest model, Zhang et al [35] designed a privacyprotected single-layer perceptron training scheme.…”
Section: Related Workmentioning
confidence: 99%
“…They conducted research on the security and privacy issues faced after the data was outsourced to the cloud server and conducted research and experimental analysis on the SVM and gradient descent algorithm, respectively. Li et al [34] solved the out-sourcing security challenge under the malicious model and used homomorphic encryption and security obfuscation circuit technology to implement the secure outsourcing calculation of the ID3 decision tree algorithm. Under the semihonest model, Zhang et al [35] designed a privacyprotected single-layer perceptron training scheme.…”
Section: Related Workmentioning
confidence: 99%
“…Ye Li et al 13 consider the multiparticipant's ciphertext problems in cloud computing. In IoT networks, huge data are to be processed which requires outsourced data storage facility such as the cloud.…”
Section: Related Workmentioning
confidence: 99%
“…Although there have been numerous studies on the privacy-preserving ID3 Algorithm, these studies are limited to two-party horizontal partitioning data mode [7], or horizontal partitioning data model with more than two-party [8,9,10,11,12,13,14,15], or vertical partitioning data model with more than two-party [16,17,18,14]. Therefore, they cannot be applied to the 2PFD setting.…”
Section: Introductionmentioning
confidence: 99%