Privacy-preserving k-means clustering over vertically partitioned data
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-preserving Bayesian network structure computation on distributed heterogeneous data
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
MapReduce: simplified data processing on large clusters
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
Protocols for secure computations
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
Fully homomorphic encryption using ideal lattices
Proceedings of the forty-first annual ACM symposium on Theory of computing
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Achieving secure, scalable, and fine-grained data access control in cloud computing
INFOCOM'10 Proceedings of the 29th conference on Information communications
Secure Ranked Keyword Search over Encrypted Cloud Data
ICDCS '10 Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems
On securing untrusted clouds with cryptography
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Hi-index | 0.00 |
Cloud computing enables customers with limited computational resources an economically promising paradigm of computation outsourcing. However, how to protect customers' confidential data that is processed and generated during the computation is becoming a major security concern. To mitigate this problem, in this paper, we present a secure outsourcing mechanism for training and evaluating large-scale logistic regression classifier in cloud. Our mechanism enables a customer to securely harness the cloud, while keeping both the sensitive input and output of the computation private. Thorough security analysis and prototype experiments on Amazon EC2 demonstrate the validity and practicality of our proposed design.