Topchyan Vardan ; Danoyan Haykaz
The privacy preserving computation research area is considered. The problem appear when one party have confidential data and need to do intense computations over that data, and computations will be done by the second party, which may be supposed being untrusted. So the content of the raw data should be kept private from the second party during the computations. Therefore these data are to be encrypted before sending them to the second party. Two possible solution scenarios are considered – one in physical and the second in theoretical levels. Physical level solution assumes some hardware integration and reorganizations. Theoretical level solution is based on cryptographic approach (homomorphic encryption).The main idea is to encrypt data in such a way that the owner, after getting the results of computations over the encrypted data, will be able to get the results on original data only by decrypting the received results. The paper brings description and analyzes of such known schemas. The final outcome is that practical cryptographic tools today are really not ready to be applied on privacy preserving computations, so that the way of solution is the use of heuristic data analyses models and algorithms that replace original data with synthesized data. Considering preparatory, this article is followed by the base research part where synthetic data generation is considered on base of CART algorithm and clustering type computational algorithms.
oai:noad.sci.am:135939
Information Content and Processing
lasl@sci.am ; vardan.topchyan@gmail.com ; hed@ipia.sci.am
Institute for Informatics and Automation Problems
Mar 3, 2021
Jul 27, 2020
25
https://noad.sci.am/publication/149532
Edition name | Date |
---|---|
Levon Aslanyan, BRIEF ANALYZIS OF TECHNIQUE FOR PRIVACY PRESERVING COMPUTATION | Mar 3, 2021 |
Aslanyan Levon Topchyan Vardan
Aslanyan Levon Gronau Hans-Dietrich SahakyanHasmik Wagner Peter
Aslanyan Levon Sahakyan Hasmik Romanov Vladimir Da Costa Georges Kacimi Rahim