Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Homomorphic Model Selection for Data Analysis in an Encrypted Domain dagger

Full metadata record
DC Field Value Language
dc.contributor.authorHong, Mi Yeon-
dc.contributor.authorYoo, Joon Soo-
dc.contributor.authorYoon, Ji Won-
dc.date.accessioned2021-08-30T15:14:24Z-
dc.date.available2021-08-30T15:14:24Z-
dc.date.created2021-06-18-
dc.date.issued2020-09-
dc.identifier.issn2076-3417-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/53297-
dc.description.abstractSecure computation, a methodology of computing on encrypted data, has become a key factor in machine learning. Homomorphic encryption (HE) enables computation on encrypted data without leaking any information to untrusted servers. In machine learning, the model selection method is a crucial algorithm that determines the performance and reduces the fitting problem. Despite the importance of finding the optimal model, none of the previous studies have considered model selection when performing data analysis through the HE scheme. The HE-based model selection we proposed finds the optimal complexity that best describes given data that is encrypted and whose distribution is unknown. Since this process requires a matrix calculation, we constructed the matrix multiplication and inverse of the matrix based on the bitwise operation. Based on these, we designed the model selection of the HE cross-validation approach and the HE Bayesian approach for homomorphic machine learning. Our focus was on evidence approximation for linear models to find goodness-of-fit that maximizes the evidence. We conducted an experiment on a dataset of age and Body Mass Index (BMI) from Kaggle to compare the capabilities and our model showed that encrypted data can regress homomorphically without decrypting it.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherMDPI-
dc.titleHomomorphic Model Selection for Data Analysis in an Encrypted Domain dagger-
dc.typeArticle-
dc.contributor.affiliatedAuthorYoon, Ji Won-
dc.identifier.doi10.3390/app10186174-
dc.identifier.wosid000580426300001-
dc.identifier.bibliographicCitationAPPLIED SCIENCES-BASEL, v.10, no.18-
dc.relation.isPartOfAPPLIED SCIENCES-BASEL-
dc.citation.titleAPPLIED SCIENCES-BASEL-
dc.citation.volume10-
dc.citation.number18-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaChemistry-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaMaterials Science-
dc.relation.journalResearchAreaPhysics-
dc.relation.journalWebOfScienceCategoryChemistry, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryEngineering, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryMaterials Science, Multidisciplinary-
dc.relation.journalWebOfScienceCategoryPhysics, Applied-
dc.subject.keywordAuthorfully homomorphic encryption-
dc.subject.keywordAuthorbitwise operation-
dc.subject.keywordAuthormodel selection-
dc.subject.keywordAuthorcross validation-
dc.subject.keywordAuthorevidence approximation-
dc.subject.keywordAuthorgauss-jordan elimination-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Yoon, Ji Won photo

Yoon, Ji Won
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE