The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper studies the feasibility of privacy-preservingdata mining in epidemiological study. As for the data-miningalgorithm, we focus to a linear multiple regression thatcan be used to identify the most significant factorsamong many possible variables, such as the historyof many diseases. We try to identify the linear model to estimate a lengthof hospital stay from distributed dataset related tothe...
In this paper, we propose a new secure protocols for privacy-preserving logistic regression of two vertically partitioned datasets. Our protocol is efficient in the sense that coefficients of logistic model are converged in few iterations by using the Iteratively Re-weighted Least Squares (IRLS). In the comparison to one of the existing work using the stochastic gradient descent (SGD), our protocol...
The Diagnosis Procedure Combination (DPC) database is a large-scale claim-based database of Japanese hospitals that uses a standardized case-mix patient-classification system for the evaluation of clinical procedures and hospital performance. The dataset does not include confidential information, although content details may allow identification of individual patients. We have developed a secure scheme...
This paper studies privacy issues related to epidemiological studies. Epidemiological studies need to preserve the privacy of subjects because they use personal information. Thus, privacy is preserved using a secure scalar product protocol based on a public-key cryptosystem and the secure function evaluation. However, the secure function evaluation has performance limitations in evaluating a product...
Confidential data should be encrypted in out-souring services in cloud computing environment in order to minimise the risk of data revealing. There have been many schemes, classified as searchable encryption, which provides capabilities to securely search over encrypted data through keywords without decryption key. In this paper, we try to combine the technique of searchable encryption with a secret...
This paper studies privacy issues related to epidemiological studies. Epidemiological studies need to preserve the privacy of subjects because they use personal information. Thus, privacy is preserved using a secure scalar product protocol based on a public-key cryptosystem and the secure function evaluation. However, the secure function evaluation has performance limitations in evaluating a product...
We study the problem of predicting a rating for an unseen item based on a distributed dataset owned by two honest-but-curious parties without revealing their private datasets to each other. Our proposed idea uses a new similarity measure such that the similarity aggregated from two local similarities is approximately equal to the global similarity. We evaluate the accuracy of prediction of rating...
Automated Trust Negotiation (ATN) is an approach to allow two participants to automatically verify whether their policies are consistent with each other or not. During the negotiation process, in order to protect privacy, both participants intend to disclose their credentials and policies as little as possible. A previous work(ATN)[14] successfully negotiates with perfect privacy preservation where...
We study the problem of predicting the rating for an unseen item based on distributed dataset by two honest-but-curious parties without revealing each private dataset. Our proposed idea uses a new similarity measure such that similarity aggregated with two local similarities is approximately equal to the global similarity. We show the accuracy reduction and the performance gain given by our proposed...
Automated Trust Negotiation aims to securely identify the consensus between two sets of policies consisting of certificates, with minimal disclosure of policies to each other. The paper proposes a new scheme that allows both parties to learn whether or not, both parties agree to transfer a given target certificate to the requesting party. No policy is revealed after performance of the protocol. No...
A recommendation system enables us to take information from huge datasets about tastes effectively. Many cryptographical protocols for computing privacy-preserving recommendation without leaking the privacy of users are proposed. However, the current issue is the large computational overhead depending the number of users. Hence, the application of the protocol is limited within small communities....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.