Title: Privacy-preserving data mining in the malicious model

Authors: Murat Kantarcioglu, Onur Kardes

Addresses: Computer Science Department, University of Texas at Dallas, Dallas, TX, USA. ' Computer Science Department, Stevens Institute of Technology, Hoboken, NJ, USA

Abstract: Most of the cryptographic work in privacy-preserving distributed data mining deals with semi-honest adversaries, which are assumed to follow the prescribed protocol but try to infer private information using the messages they receive during the protocol. Although the semi-honest model is reasonable in some cases, it is unrealistic to assume that adversaries will always follow the protocols exactly. In particular, malicious adversaries could deviate arbitrarily from their prescribed protocols. Secure protocols that are developed against malicious adversaries require utilisation of complex techniques. Clearly, protocols that can withstand malicious adversaries provide more security. However, there is an obvious trade-off: protocols that are secure against malicious adversaries are generally more expensive than those secure against semi-honest adversaries only. In this paper, our goal is to make an analysis of trade-offs between performance and security in privacy-preserving distributed data mining algorithms in the two models. In order to make a realistic comparison, we enhance commonly used subprotocols that are secure in the semi-honest model with zero knowledge proofs to be secure in the malicious model. We compare the performance of these protocols in both models.

Keywords: privacy preservation; distributed data mining; secure multiparty computation; malicious model; semi-honest model; cryptography; information security; performance.

DOI: 10.1504/IJICS.2008.022488

International Journal of Information and Computer Security, 2008 Vol.2 No.4, pp.353 - 375

Published online: 09 Jan 2009 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article