A Hybrid Multi-Client Filter Based Feature Clustering and Privacy Preserving Classification Framework on High Dimensional Databases
Keywords:
privacy preserving, multi-client privacy preserving model, ensemble classification and clusteringAbstract
A multi-client perturbation based data clustering approach for privacy preserving multi-client data analysis is one of the best strategy for the multi-client data privacy applications. The approach is based on the concept of adding noise to the data, in order to make it difficult for an attacker to infer sensitive information about individual data points, while still allowing for meaningful analysis to be performed. The data is partitioned among multiple clients and each client applies a local clustering algorithm to their data. The clients then share their local clustering results with each other, but not the actual data. A global clustering is then constructed by combining the local clustering results.In addition to this, it proposes an optimal bayesian privacy preserving approach using advanced CP-ABE scheme. This approach uses the concept of ciphertext-policy attribute-based encryption (CP-ABE) to encrypt the data and to provide fine-grained access control to the data. The approach estimates the joint probability of the data across multiple clients and uses this estimation to calculate the Bayes Score, which is a measure of the accuracy of the classifier. By maximizing the Bayes Score, the method can select the optimal classifier for the multi-client data while preserving the privacy of the individual clients.Experimental results on different datasets demonstrate that the proposed approach achieves good clustering performance while preserving the privacy of the individual data points. The results also show that the proposed optimal bayesian privacy preserving approach using advanced CP-ABE scheme can effectively protect the privacy of the data while providing accurate results.
Downloads
References
N. Wang et al., “A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles,” Digital Communications and Networks, May 2022, doi: 10.1016/j.dcan.2022.05.020.
D. G. Nair, J. J. Nair, K. Jaideep Reddy, and C. V. Aswartha Narayana, “A privacy preserving diagnostic collaboration framework for facial paralysis using federated learning,” Engineering Applications of Artificial Intelligence, vol. 116, p. 105476, Nov. 2022, doi: 10.1016/j.engappai.2022.105476.
W. Wang, X. Li, X. Qiu, X. Zhang, V. Brusic, and J. Zhao, “A privacy preserving framework for federated learning in smart healthcare systems,” Information Processing & Management, vol. 60, no. 1, p. 103167, Jan. 2023, doi: 10.1016/j.ipm.2022.103167.
J. Zhao et al., “CORK: A privacy-preserving and lossless federated learning scheme for deep neural network,” Information Sciences, vol. 603, pp. 190–209, Jul. 2022, doi: 10.1016/j.ins.2022.04.052.
C. Dhasarathan et al., “COVID-19 health data analysis and personal data preserving: A homomorphic privacy enforcement approach,” Computer Communications, vol. 199, pp. 87–97, Feb. 2023, doi: 10.1016/j.comcom.2022.12.004.
S. Srijayanthi and T. Sethukarasi, “Design of privacy preserving model based on clustering involved anonymization along with feature selection,” Computers & Security, vol. 126, p. 103027, Mar. 2023, doi: 10.1016/j.cose.2022.103027.
V. Terziyan, D. Malyk, M. Golovianko, and V. Branytskyi, “Encryption and Generation of Images for Privacy-Preserving Machine Learning in Smart Manufacturing,” Procedia Computer Science, vol. 217, pp. 91–101, Jan. 2023, doi: 10.1016/j.procs.2022.12.205.
Y. Wang, J. Ma, N. Gao, Q. Wen, L. Sun, and H. Guo, “Federated fuzzy k-means for privacy-preserving behavior analysis in smart grids,” Applied Energy, vol. 331, p. 120396, Feb. 2023, doi: 10.1016/j.apenergy.2022.120396.
N. Rodríguez-Barroso et al., “Federated Learning and Differential Privacy: Software tools analysis, the Sherpa.ai FL framework and methodological guidelines for preserving data privacy,” Information Fusion, vol. 64, pp. 270–292, Dec. 2020, doi: 10.1016/j.inffus.2020.07.009.
M. Khan, F. G. Glavin, and M. Nickles, “Federated Learning as a Privacy Solution - An Overview,” Procedia Computer Science, vol. 217, pp. 316–325, Jan. 2023, doi: 10.1016/j.procs.2022.12.227. [11] S. K. Singh, L. T. Yang, and J. H. Park, “FusionFedBlock: Fusion of blockchain and federated learning to preserve privacy in industry 5.0,” Information Fusion, vol. 90, pp. 233–240, Feb. 2023, doi: 10.1016/j.inffus.2022.09.027.
J. Zhang, Y. Huang, Q. Huang, Y. Li, and X. Ye, “Hasse sensitivity level: A sensitivity-aware trajectory privacy-enhanced framework with Reinforcement Learning,” Future Generation Computer Systems, vol. 142, pp. 301–313, May 2023, doi: 10.1016/j.future.2023.01.008.
M. Field et al., “Infrastructure platform for privacy-preserving distributed machine learning development of computer-assisted theragnostics in cancer,” Journal of Biomedical Informatics, vol. 134, p. 104181, Oct. 2022, doi: 10.1016/j.jbi.2022.104181.
Z. Zhou, Q. Fu, Q. Wei, and Q. Li, “LEGO: A hybrid toolkit for efficient 2PC-based privacy-preserving machine learning,” Computers & Security, vol. 120, p. 102782, Sep. 2022, doi: 10.1016/j.cose.2022.102782.
W. Briguglio, P. Moghaddam, W. A. Yousef, I. Traoré, and M. Mamun, “Machine learning in precision medicine to preserve privacy via encryption,” Pattern Recognition Letters, vol. 151, pp. 148–154, Nov. 2021, doi: 10.1016/j.patrec.2021.07.004.
X. Zhu, J. Wang, W. Chen, and K. Sato, “Model compression and privacy preserving framework for federated learning,” Future Generation Computer Systems, vol. 140, pp. 376–389, Mar. 2023, doi: 10.1016/j.future.2022.10.026.
M. A. P. Chamikara, P. Bertok, I. Khalil, D. Liu, and S. Camtepe, “Privacy preserving distributed machine learning with federated learning,” Computer Communications, vol. 171, pp. 112–125, Apr. 2021, doi: 10.1016/j.comcom.2021.02.014.
A. K. Nair, J. Sahoo, and E. D. Raj, “Privacy preserving Federated Learning framework for IoMT based big data analysis using edge computing,” Computer Standards & Interfaces, vol. 86, p. 103720, Aug. 2023, doi: 10.1016/j.csi.2023.103720.
R. Venugopal, N. Shafqat, I. Venugopal, B. M. J. Tillbury, H. D. Stafford, and A. Bourazeri, “Privacy preserving Generative Adversarial Networks to model Electronic Health Records,” Neural Networks, vol. 153, pp. 339–348, Sep. 2022, doi: 10.1016/j.neunet.2022.06.022.
Y. Wan, Y. Qu, L. Gao, and Y. Xiang, “Privacy-preserving blockchain-enabled federated learning for B5G-Driven edge computing,” Computer Networks, vol. 204, p. 108671, Feb. 2022, doi: 10.1016/j.comnet.2021.108671.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.