๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Privacy-preserving Computing: for Big Data Analytics and AI

โœ Scribed by KAI CHEN; QIANG YANG


Publisher
Cambridge University Press
Year
2023
Tongue
English
Leaves
269
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Privacy-preserving computing aims to protect the personal information of users while capitalizing on the possibilities unlocked by big data. This practical introduction for students, researchers, and industry practitioners is the first cohesive and systematic presentation of the field's advances over four decades. The book shows how to use privacy-preserving computing in real-world problems in data analytics and AI, and includes applications in statistics, database queries, and machine learning. The book begins by introducing cryptographic techniques such as secret sharing, homomorphic encryption, and oblivious transfer, and then broadens its focus to more widely applicable techniques such as differential privacy, trusted execution environment, and federated learning. The book ends with privacy-preserving computing in practice in areas like finance, online advertising, and healthcare, and finally offers a vision for the future of the field.

โœฆ Table of Contents


1 Introduction to Privacy-preserving Computing 1
1.1 Definition and Background 1
1.2 Main Technologies of Privacy-preserving Computing 9
1.3 Privacy-preserving Computing Platforms and Cases 11
1.4 Challenges and Opportunities in Privacy-preserving
Computing 12
2 Secret Sharing 13
2.1 Problem and Definition 14
2.2 Principle and Implementations 19
2.3 Advantages and Disadvantages 29
2.4 Application Scenarios 29
3 Homomorphic Encryption 36
3.1 Definition 36
3.2 Principle and Implementation 42
3.3 Advantages and Disadvantages 55
3.4 Applications 57
4 Oblivious Transfer 63
4.1 Definition 63
4.2 Implementation 64
4.3 Applications 67
5 Garbled Circuit 69
5.1 Definition 69
5.2 Implementation 71
v
vi Contents
5.3 Advantages and Disadvantages 77
5.4 Applications 77
6 Differential Privacy 80
6.1 Introduction 80
6.2 Problem Definition 82
6.3 Mechanisms for DP 89
6.4 Properties of DP 93
6.5 Applications 96
6.6 Advantages and Disadvantages 103
7 Trusted Execution Environment 105
7.1 Introduction 105
7.2 Principles and Implementations 107
7.3 Advantages and Disadvantages of TEE 113
7.4 Application Scenarios 116
8 Federated Learning 121
8.1 Background, Definition, and Categorization 121
8.2 Horizontal Federated Learning 126
8.3 Vertical Federated Learning 134
8.4 Federated Transfer Learning 139
8.5 Applications of Federated Learning 144
8.6 Future Prospectives 147
9 Privacy-preserving Computing Platforms 150
9.1 Introduction to Privacy-preserving Computing
Platforms 150
9.2 FATE Secure Computing Platform 151
9.3 CryptDB Encrypted Database System 158
9.4 MesaTEE Secure Computing Platform (Teaclave) 164
9.5 Conclave Query System 172
9.6 PrivPy Privacy-preserving Computing Platform 178
9.7 Efficiency Issues and Acceleration Strategies 184
10 Case Studies of Privacy-preserving Computing 194
10.1 Financial Marketing and Risk Control 194
10.2 Advertising Billing 200
10.3 Advertisement Recommendation 204
10.4 Data Query 206
10.5 Genetic Research 209
10.6 Pharmaceutical Research 214
Contents vii
10.7 Speech Recognition 216
10.8 Privacy-preserving Computing in Governments 218
10.9 User Data Statistics 226
11 Future of Privacy-preserving Computing 233
References 238
Index 253


๐Ÿ“œ SIMILAR VOLUMES


Big Data Privacy Preservation for Cyber-
โœ Miao Pan, Jingyi Wang, Sai Mounika Errapotu, Xinyue Zhang, Jiahao Ding, Zhu Han ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p><p>This SpringerBrief mainly focuses on effective big data analytics for CPS, and addresses the privacy issues that arise on various CPS applications. The authors develop a series of privacy preserving data analytic and processing methodologies through data driven optimization based on applied cr

Security and Privacy for Big Data, Cloud
โœ Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› The Institution of Engineering and Technology ๐ŸŒ English

As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a comprehensive view on how to advance security and privac

Data Science and Big Data Analytics: Dis
โœ EMC Education Services [EMC Education Services] ๐Ÿ“‚ Library ๐Ÿ“… 2015 ๐Ÿ› John Wiley & Sons ๐ŸŒ English

<span><span><p><em>Data Science and Big Data Analytics</em> is about harnessing the power of data for new insights. The book covers the breadth of activities and methods and tools that Data Scientists use. The content focuses on concepts, principles and practical applications that are applicable to

Data Science and Big Data Analytics: Dis
โœ EMC Education Services ๐Ÿ“‚ Library ๐Ÿ“… 2015 ๐Ÿ› Wiley ๐ŸŒ English

<i>Data Science and Big Data Analytics</i> is about harnessing the power of data for new insights. The book covers the breadth of activities and methods and tools that Data Scientists use. The content focuses on concepts, principles and practical applications that are applicable to any industry and

Big Data Analytics and Computational Int
โœ Mariya Ouaissa, Zakaria Boulouard, Mariyam Ouaissa, Inam Ullah Khan, Mohammed Ka ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Springer ๐ŸŒ English

<p><span>This book presents a collection of state-of-the-art artificial intelligence and big data analytics approaches to cybersecurity intelligence. It illustrates the latest trends in AI/ML-based strategic defense mechanisms against malware, vulnerabilities, cyber threats, as well as proactive cou

Cloud Computing for Geospatial Big Data
โœ Himansu Das, Rabindra K. Barik, Harishchandra Dubey, Diptendu Sinha Roy ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p><p></p><p>This book introduces the latest research findings in cloud, edge, fog, and mist computing and their applications in various fields using geospatial data. It solves a number of problems of cloud computing and big data, such as scheduling, security issues using different techniques, which