Loading [MathJax]/extensions/MathMenu.js
Privacy Preservation of Business Forecasting Using Homomorphic Encryption | IEEE Conference Publication | IEEE Xplore

Privacy Preservation of Business Forecasting Using Homomorphic Encryption


Abstract:

Data privacy is very much essential in this digital world. Data privacy prevents the information of an organization from fraudulent activities such as hacking, phishing, ...Show More

Abstract:

Data privacy is very much essential in this digital world. Data privacy prevents the information of an organization from fraudulent activities such as hacking, phishing, and identity theft. Machine learning is an emerging technology. But a huge amount of data is required for training the Machine learning model. When an organization wants to analyze their profit rate it has to send its data to third party which may reveal organization's business tactics or sensitive data. Hence, there is always a risk of data privacy. So, privacy preserving is used. Privacy preserving prevents data leakage from machine learning algorithms. There are many privacy preserving machine learning strategies which are used for data privacy. Homomorphic Encryption is one such technique. In homomorphic encryption, the data to be fed to train the machine learning model is encrypted. The encrypted data is then fed to the machine learning model. The machine learning model performs the required computation and returns the result in encrypted form, which on decryption returns the required output
Date of Conference: 05-07 January 2023
Date Added to IEEE Xplore: 03 April 2023
ISBN Information:
Conference Location: Chennai, India
References is not available for this document.

I. Introduction

Machine learning is at the heart of Artificial Intelligence. It gives machines the ability to learn things by themselves by training them. Datais very critical in Machine Learning. Privacy of the data is also very important. If an organisation wants to give its data to a third party so that it would make a prediction, then the data of the organisation might be at risk. The organisation might not want to give its data to the third party. Similarly, the third party might not want to share its Machine Learning Algorithm for maintaining competitive advantages. Even when the data or features extracted are sent through secure channels, there is a chance for reconstruction attacks, membership inference attacks [1]. Privacy Preserving is thus used to protect the confidentiality of the data by predicting the output of

Select All
1.
Mohammad Al-Rubaie and J. Morris Chang, "Privacy-preserving machine learning: Threats and solutions", IEEE Security & Privacy, vol. 17, no. 2, pp. 49-58, 2019.
2.
S. Joshi, "An efficient Paillier cryptographic technique for secure data storage on the cloud", 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS), pp. 145-149, May 2020.
3.
Dong Xiaoxia et al., "Privacy-preserving locally weighted linear regression over encrypted millions of data", IEEE Access, vol. 8, pp. 2247-2257, 2019.
4.
Muhammad Adnan Khan et al., "Effective demand forecasting model using business intelligence empowered with machine learning", IEEE Access, vol. 8, pp. 116013-116023, 2020.
5.
K. Punam, R. Pamula and P. K. Jain, "A two-level statistical model for big mart sales prediction", 2018 International Conference on Computing Power and Communication Technologies (GUCON), pp. 617-620, September 2018.
6.
Sun Xiaoqiang et al., "Private machine learning classification based on fully homomorphic encryption", IEEE Transactions on Emerging Topics in Computing, vol. 8, no. 2, pp. 352-364, 2018.
7.
Kim Jeongsu and Aaram Yun, "Secure fully homomorphic authenticated encryption", IEEE Access, vol. 9, pp. 107279-107297, 2021.
8.
Kim Hyunil et al., "Efficient privacy-preserving machine learning for blockchain network", IEEE Access, vol. 7, pp. 136481-136495, 2019.
9.
R. Karim, M. K. Alam and M. R. Hossain, "Stock Market Analysis Using Linear Regression and Decision Tree Regression", 2021 1st International Conference on Emerging Smart Technologies and Applications (eSmarTA), pp. 1-6, August 2021.
10.
Alex Sona, K. J. Dhanaraj and P. P. Deepthi, "Private and Energy-Efficient Decision Tree-Based Disease Detection for Resource-Constrained Medical Users in Mobile Healthcare Network", IEEE Access, vol. 10, pp. 17098-17112, 2022.
11.
Zhou Tanping et al., "Secure scheme for locating disease-causing genes based on multi-key homomorphic encryption", Tsinghua Science and Technology, vol. 27, no. 2, pp. 333-343, 2021.
12.
K. Suresh and S. Vadlamudi, "Intelligent Data Transfer To Ensure Data Privacy In Large Enterprises", 2022 IEEE Fourth International Conference on Advances in Electronics Computers and Communications (ICAECC), pp. 1-6, January 2022.
13.
S. J. Mohammed and D. B. Taha, "Performance Evaluation of RSA ElGamal and Paillier Partial Homomorphic Encryption Algorithms", 2022 International Conference on Computer Science and Software Engineering (CSASE), pp. 89-94, March 2022.
14.
Hariss Khalil, Maroun Chamoun and Abed Ellatif Samhat, "Cloud assisted privacy preserving using homomorphic encryption", 2020 4th Cyber Security in Networking Conference (CSNet), 2020.
15.
Zhu Liehuang et al., "Privacy-preserving machine learning training in IoT aggregation scenarios", IEEE Internet of Things Journal, vol. 8, no. 15, pp. 12106-12118, 2021.
Contact IEEE to Subscribe

References

References is not available for this document.