Abstract
The simplicial depth (SD) of a query point \(q\in \mathbb {R}^{d}\) with respect to a dataset \(S\subset \mathbb {R}^{d}\) is defined based on counting all (d + 1)-dimensional simplices obtained from S that contain q. The simplicial depth is a ranking function which is frequently used in order to sort a multivariate dataset. In the higher dimension d, no better algorithm is known than the brute force method which takes Θ(nd+ 1) time, where |S| = n. Unfortunately, in contrast to the many advantages that have been previously identified by research studies, this depth function requires a massive amount of computation particularly for higher dimensional datasets. This challenge could be overcome by offloading the computation to cloud servers. However, delegating simplicial depth queries to not fully trusted cloud servers would be a source of serious security breaches and privacy issues. Therefore, in this paper, we target the privacy-preserving simplicial depth query over collaborative cloud servers. To this end, two resource-abundant cloud servers will be employed to perform such time consuming computation while maintaining the user’s privacy. Security analysis shows our proposed scheme achieves privacy-preserving requirements. In addition, some experiments based on a dataset generated by normal distribution are conducted, and the results validate the efficiency and practicality of our proposed scheme. Although this work only focuses on the planar case, our proposed scheme can be extended into higher dimension cases without significant alterations.
Similar content being viewed by others
Notes
A simplex in \(\mathbb {R}\) is a line segment, in \(\mathbb {R}^{2}\) is a triangle, in \(\mathbb {R}^{3}\) is a tetrahedron, etc.
References
Acar A, Aksu H, Selcuk Uluagac A., Conti M (2018) A survey on homomorphic encryption schemes: Theory and implementation. ACM Comput Surv 51:79:1–79:35
Aloupis G On computing geometric estimators of location, 2001. Master’s thesis, M. Sc. McGill University
Aloupis G, Cortés C, Gómez F, Soss M, Toussaint G (2002) Lower bounds for computing statistical depth. Comput Stat Data Anal 40(2):223–229
Aloupis G, Langerman S, Soss M, Toussaint G (2003) Algorithms for bivariate medians and a fermat–torricelli problem for lines. Comput Geom 26(1):69–79
Boneh D, Goh E-J, Nissim K (2005) Evaluating 2-dnf formulas on ciphertexts. In: Theory of Cryptography Conference, Springer, pp 325–341
Bos JW, Lauter K, Loftus J, Naehrig M (2013) Improved security for a ring-based fully homomorphic encryption scheme. In: IMA International Conference on Cryptography and Coding, Springer, pp 45–64
Brakerski Z, Gentry C, Vaikuntanathan V (2014) (leveled) fully homomorphic encryption without bootstrapping. ACM Trans Comput Theory (TOCT) 6(3):13
Chen D (2013) Algorithms for data depth. Carleton University
Chen ZQ (1995) Bounds for the breakdown point of the simplicial median. J Multivar Anal 55(1):1–13
Cheng AY, Ouyang M (2001) On algorithms for simplicial depth. In: CCCG, pp 53–56
ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469–472
Eppstein D, Goodrich MT, Tamassia R (2010) Privacy-preserving data-oblivious geometric algorithms for geographic data. In: Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM, pp 13–22
Fan J, Vercauteren F (2012) Somewhat practical fully homomorphic encryption. IACR Cryptology ePrint Archive 2012:144
Gentry C, Boneh D (2009) A fully homomorphic encryption scheme, vol 20. Stanford University Stanford
Hans S, Addepalli SC, Gupta A, Srinathan K (2009) On privacy preserving convex hull. In: International Conference on Availability, Reliability and Security, 2009. ARES’09. IEEE, pp 187–192
Hazewinkel M (2013) Encyclopaedia of Mathematics: C An updated and annotated translation of the Soviet ? Mathematical Encyclopaedia?, vol 2. Springer Science & Business Media
He X, Wang G (1997) Convergence of depth contours for multivariate datasets. The Annals of Statistics, pp 495–504
Hotelling H (1990) Stability in competition. In: The Collected Economics Articles of Harold Hotelling, Springer, pp 50–63
Jo S, Han J (2018) Convergence p2p cloud computing. Peer-to-Peer Networking and Applications 11 (6):1153–1155
Langerman S, Steiger W (2000) The complexity of hyperplane depth in the plane. In: Symposium on Discrete Algorithms, ACM and SIAM
Lepoint T, Naehrig M (2014) A comparison of the homomorphic encryption schemes fv and yashe. In: International Conference on Cryptology in Africa, Springer, pp 318–335
Liang K, Yang B, He D, Zhou M (2011) Privacy-preserving computational geometry problems on conic sections. J Comput Inf Syst 7(6):1910–1923
Liu RY (1990) On a notion of data depth based on random simplices. The Annals of Statistics. pp 405–414
Liu RY (1995) Control charts for multivariate processes. J Am Stat Assoc 90(432):1380–1387
Liu RY, Serfling RJ, Souvaine DL (2006) Data depth: robust multivariate analysis, computational geometry, and applications, volume 72 American Mathematical Soc.
López-Alt A, Tromer E, Vaikuntanathan V (2012) On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: Proceedings of the forty-fourth Annual ACM Symposium on Theory of Computing, ACM, pp 1219–1234
Lu W, Kawasaki S, Sakuma J Using fully homomorphic encryption for statistical analysis of categorical, ordinal and numerical data (this is the full version of the conference paper presented at ndss 2017). Technical report, IACR Cryptology ePrint Archive, Report 2016/1163 (2016). https://eprint.iacr.org/2016/1163.pdf
Miller K, Ramaswami S, Rousseeuw P, Sellarès T, Souvaine D, Streinu I, Struyf A (2001) Fast implementation of depth contours using topological sweep. In: Proceedings of the Twelfth annual ACM-SIAM Symposium on Discrete Algorithms, Society for Industrial and Applied Mathematics, pp 690–699
Mosler K (2013) Depth statistics. In: Robustness and complex data structures, Springer, pp 17–34
Oja H (1983) Descriptive statistics for multivariate distributions. Statist Probab Lett 1(6):327–332
Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp 223–238
Regev O (2010) The learning with errors problem. Invited survey in CCC, p 7
Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126
Roman R, Lopez J, Mambo M (2018) Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Futur Gener Comput Syst 78:680–698
Rousseeuw PJ, Hubert M (1999) Regression depth. J Am Stat Assoc 94(446):388–402
Simple Encrypted Arithmetic Library (release 3.1.0) https://github.com/microsoft/SEAL, December 2018. Microsoft Research, Redmond, WA
Shahsavarifar R, Bremner D (2018) Approximate data depth revisited. arXiv:1805.07373
Small CG (1990) A survey of multidimensional medians. International Statistical Review/Revue Internationale de Statistique, pp 263–277
Smart NP, Vercauteren F (2010) Fully homomorphic encryption with relatively small key and ciphertext sizes. In: International Workshop on Public Key Cryptography, Springer, pp 420–443
Smith A (2011) Privacy-preserving statistical estimation with optimal convergence rates. In: Proceedings of the Forty-third Annual ACM Symposium on Theory of Computing, ACM, pp 813–822
Tukey JW (1975) Mathematics and the picturing of data. In: Proceedings of the International Congress of Mathematicians, vol 2, pp 523–531
Dijk Marten Van, Gentry Craig, Halevi Shai, Vaikuntanathan Vinod (2010) Fully homomorphic encryption over the integers. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp 24–43
Wu D, Haven J (2012) Using homomorphic encryption for large scale statistical analysis. Technical report Technical report: cs. stanford. edu/people/dwu4/papers/FHESI Report pdf
Zuo Y, Serfling R (2000) General notions of statistical depth function. Annals of Statistics, pp 461–482
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Mahdikhani, H., Shahsavarifar, R., Lu, R. et al. Achieve privacy-preserving simplicial depth query over collaborative cloud servers. Peer-to-Peer Netw. Appl. 13, 412–423 (2020). https://doi.org/10.1007/s12083-019-00810-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-019-00810-7