Next Article in Journal
An Abstraction Based Approach for Reconstruction of TimeLine in Digital Forensics
Next Article in Special Issue
A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment
Previous Article in Journal
Mathematical Analysis on an Asymmetrical Wavy Motion of Blood under the Influence Entropy Generation with Convective Boundary Conditions
Previous Article in Special Issue
Internet of Things Meets Vehicles: Sheltering In-Vehicle Network through Lightweight Machine Learning
Open AccessArticle

Towards an Efficient Privacy-Preserving Decision Tree Evaluation Service in the Internet of Things

1
College of Computer, National University of Defense Technology, Changsha 410073, China
2
National Key Laboratory for Parallel and Distributed Processing, National University of Defense Technology, Changsha 410073, China
*
Authors to whom correspondence should be addressed.
Symmetry 2020, 12(1), 103; https://doi.org/10.3390/sym12010103
Received: 17 December 2019 / Revised: 29 December 2019 / Accepted: 2 January 2020 / Published: 6 January 2020
With the fast development of the Internet of Things (IoT) technology, normal people and organizations can produce massive data every day. Due to a lack of data mining expertise and computation resources, most of them choose to use data mining services. Unfortunately, directly sending query data to the cloud may violate their privacy. In this work, we mainly consider designing a scheme that enables the cloud to provide an efficient privacy-preserving decision tree evaluation service for resource-constrained clients in the IoT. To design such a scheme, a new secure comparison protocol based on additive secret sharing technology is proposed in a two-cloud model. Then we introduce our privacy-preserving decision tree evaluation scheme which is designed by the secret sharing technology and additively homomorphic cryptosystem. In this scheme, the cloud learns nothing of the query data and classification results, and the client has no idea of the tree. Moreover, this scheme also supports offline users. Theoretical analyses and experimental results show that our scheme is very efficient. Compared with the state-of-art work, both the communication and computational overheads of the newly designed scheme are smaller when dealing with deep but sparse trees. View Full-Text
Keywords: privacy-preserving computation; decision tree; data security and privacy; Internet of Things; asymmetric cryptosystem privacy-preserving computation; decision tree; data security and privacy; Internet of Things; asymmetric cryptosystem
Show Figures

Figure 1

MDPI and ACS Style

Liu, L.; Su, J.; Zhao, B.; Wang, Q.; Chen, J.; Luo, Y. Towards an Efficient Privacy-Preserving Decision Tree Evaluation Service in the Internet of Things. Symmetry 2020, 12, 103.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop